Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-0002 (GCVE-0-2022-0002)
Vulnerability from cvelistv5
Published
2022-03-11 17:54
Modified
2025-05-05 16:44
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- information disclosure
Summary
Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.
References
▼ | URL | Tags | |
---|---|---|---|
secure@intel.com | http://www.openwall.com/lists/oss-security/2022/03/18/2 | Mailing List, Third Party Advisory | |
secure@intel.com | https://security.netapp.com/advisory/ntap-20220818-0004/ | Third Party Advisory | |
secure@intel.com | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html | Vendor Advisory | |
secure@intel.com | https://www.oracle.com/security-alerts/cpujul2022.html | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2022/03/18/2 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20220818-0004/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpujul2022.html | Patch, Third Party Advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) Processors |
Version: See references |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:18:41.442Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html" }, { "name": "[oss-security] 20220318 Xen Security Advisory 398 v2 - Multiple speculative security issues", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/03/18/2" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20220818-0004/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-0002", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-23T13:21:05.799722Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-noinfo Not enough information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-05T16:44:17.326Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Intel(R) Processors", "vendor": "n/a", "versions": [ { "status": "affected", "version": "See references" } ] } ], "descriptions": [ { "lang": "en", "value": "Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access." } ], "problemTypes": [ { "descriptions": [ { "description": " information disclosure ", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-18T14:09:32.000Z", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html" }, { "name": "[oss-security] 20220318 Xen Security Advisory 398 v2 - Multiple speculative security issues", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2022/03/18/2" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20220818-0004/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2022-0002", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) Processors", "version": { "version_data": [ { "version_value": "See references" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": " information disclosure " } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html" }, { "name": "[oss-security] 20220318 Xen Security Advisory 398 v2 - Multiple speculative security issues", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2022/03/18/2" }, { "name": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "name": "https://security.netapp.com/advisory/ntap-20220818-0004/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20220818-0004/" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2022-0002", "datePublished": "2022-03-11T17:54:36.000Z", "dateReserved": "2021-10-15T00:00:00.000Z", "dateUpdated": "2025-05-05T16:44:17.326Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-0002\",\"sourceIdentifier\":\"secure@intel.com\",\"published\":\"2022-03-11T18:15:25.373\",\"lastModified\":\"2025-05-05T17:17:30.080\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.\"},{\"lang\":\"es\",\"value\":\"La compartici\u00f3n no transparente de selectores de predicci\u00f3n de rama dentro de un contexto en algunos procesadores Intel(R) puede permitir que un usuario autorizado permita potencialmente una divulgaci\u00f3n de informaci\u00f3n por medio del acceso local\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.0,\"impactScore\":4.0},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.0,\"impactScore\":4.0}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":2.1,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.9,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c3308:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E18B9E2-0659-4A50-88F6-D3D429EC5F8A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c3336:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"158C116D-5E24-4593-A283-F6810E424B5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c3338:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEE5F25C-8092-4A74-B265-4BB720DA1A4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c3338r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C58BF4A8-2B69-49B7-9113-554D61CE9FDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c3436l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11C5EF68-F91F-4395-BDC6-CD3B7348C45C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c3508:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A33FC1CB-7983-48B9-AF3C-E3CF958B5FA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c3538:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF500096-2B4A-476B-BBCA-1FEE100ABC91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c3558:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F17C3AB-AC03-427F-B0A9-9EACD2A231C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c3558r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2951F904-97AA-4AE6-B227-0A0D282369ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c3558rc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70C31407-B78D-4406-B3B8-49BD89E674ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c3708:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4058BBB2-268F-47E6-BE5A-992C5F460BC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c3750:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F191949-2674-4968-90CC-030D6E8901D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c3758:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6893581C-5447-4FAD-BFCB-41727FAB4CF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c3758r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0E89FF1-C329-4975-9706-75FD84FDD5C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c3808:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42737F96-25B8-4E3E-AED2-47FA27075A23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c3830:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D397ED37-60EE-49F0-95F0-2C6F666E9368\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c3850:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65F731F9-59EB-4161-AB8B-506BC336B987\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c3858:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F35B073-EA5F-4746-AB8B-674C9EAFDC3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c3950:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EA6C3DB-8E6D-4CF8-BD52-B362C83DF4A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c3955:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6107B3F-C7FE-46EF-A80E-1A4DD55F9306\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c3958:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36E7FA68-B62B-4EEF-B8EA-665026E1E3F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_p5921b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6D6CEE1-25DF-43C5-AEBB-49585B64236A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_p5931b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31E2104F-0CE3-4B9D-88B3-35D982C36562\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_p5942b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D860FEC-BA79-4FEE-A79C-88AA857358E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_p5962b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2CEF8A6-2445-4B63-822D-81F6AC708D62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_x5-a3930:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E374730D-0311-47F5-9EE3-ECD205693167\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_x5-a3940:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45765887-0882-4D33-9D32-675581C35BC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_x5-a3950:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B2D4F4B-6DB7-414D-A41F-DA17D7C1AA52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_x5-a3960:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EB4891F-358E-4A6E-A3D4-C83F8E45B19D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_x5-e3930:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"454AC633-5F1C-47BB-8FA7-91A5C29A1DD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_x5-e3940:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2394E8C-58D9-480B-87A7-A41CD7697FC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_x5-z8300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"340E1684-9D34-4EE5-BE07-3F60E73CBCD4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_x5-z8330:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34955A77-9727-40DA-8A8D-7C3959548F07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_x5-z8350:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"010EF148-6B26-4A06-BACC-E99053B477D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_x5-z8500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6225DAE1-2391-4983-B2AE-4E3697D1A636\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_x5-z8550:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"275DC6ED-703A-4527-95CA-A0A3A28221FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_x6200fe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89231773-9D9B-434A-A6A3-8527C4F6FEBB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_x6211e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A85EA674-2537-4323-AEDA-FA356489E7DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_x6212re:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F85599DD-3F80-4EB0-9753-D24EDD8D76CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_x6413e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B3348F4-8E2B-42BE-9F3A-48DFF5CE0047\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_x6425e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F068F4F-8CCD-4218-871C-BEABEB0DAB55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_x6425re:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7313975C-41A5-4657-8758-1C16F947BE4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_x6427fe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FBE4406-9979-4723-833C-176F051E6389\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_x7-e3950:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B9AC02B-D3AE-4FAF-836E-55515186A462\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_x7-z8700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89150484-4C7D-4FC7-A7D5-1B95F0277BF0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_x7-z8750:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FA42676-1442-4692-8F2D-6A42E5E40DDF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_5305u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39831D4E-743A-4C09-900F-24DDAB5D1B22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_6305:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D63F16DE-E30E-4268-B079-E07FD28355BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_6305e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"936DAD12-11D6-4AAF-B48D-5076C94BF30C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_6600he:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F11BB81D-8243-4B19-835C-6E0B4341894A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_g5205u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BFB5A51-399C-4AC5-BA09-E74C5AD520EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_g5305u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F42D5DAA-8279-4A4F-A843-EBA0814952BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_g5900:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"545649F6-46CA-40CB-8A00-5DD40F6A83B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_g5900t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D42AC70C-B114-4795-8769-D9AF12298456\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_g5905:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DEF520D-9427-4C5A-81F0-FCED5E2A8B99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_g5905t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B773674-1DB0-41D8-A758-2AF49F4722D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_g5920:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"153ABD9D-2C72-40C6-8DF9-3EB7D1D35B09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_g5925:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4036274A-CC6F-48B2-BF2E-DF51C4148B93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_g6900:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABAF1125-B4F7-4BC9-B9DA-CA9125D4BC65\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_g6900t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AA8490E-45D6-4B6E-AF98-B75385574D6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_j3355:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7087FCA7-6D5C-45A5-B380-533915BC608A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_j3355e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85683891-11D4-47B1-834B-5E0380351E78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_j3455:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBF2D89D-AC2D-4EAB-ADF3-66C25FE54E19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_j3455e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03D778C7-F242-4A6A-9B62-A7C578D985FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_j4005:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"652EC574-B9B6-4747-AE72-39D1379A596B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_j4025:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"522A9A57-B8D8-4C61-92E3-BE894A765C12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_j4105:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A588BEB3-90B5-482E-B6C4-DC6529B0B4C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_j4125:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"826BAF04-E174-483D-8700-7FA1EAC4D555\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_j6413:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7A8BF58-1D33-484A-951C-808443912BE8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_n3350:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5884F21-BAB5-4A45-8C72-C90D07BAECA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_n3350e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC2A2AC5-FA56-49F0-BA00-E96B10FEF889\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_n3450:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8FF7ADD-9E27-4A23-9714-5B76132C20BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_n4000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8771AB4-2F51-494D-8C86-3524BB4219C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_n4020:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D7E822D-994F-410D-B13C-939449FFC293\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_n4100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB5576F2-4914-427C-9518-ED7D16630CC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_n4120:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3ABB7C52-863F-4291-A05B-422EE9615FAE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_n4500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B54D15DF-53EA-4611-932A-EDB8279F582A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_n4504:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06499DE1-DA07-4C39-BBAC-FC57F4E0D4C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_n5100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96D6F5D3-3559-47AD-8201-C9D34417DC09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_n5105:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA455AC5-8434-4B59-BE89-E82CDACD2AEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_n6211:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"406E9139-BCFF-406B-A856-57896D27B752\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DAA00D4-A8AA-44AA-9609-0A40BD4FB2E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF64D95C-653A-4864-A572-CD0A64B6CDF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30B2F570-1DD9-49C7-BB72-0EA0E9A417C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-10100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DA9CBE9-CF87-495B-8D80-5DDDCD2044B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-10100f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"614B1B4E-E1D7-417F-86D1-92F75D597E36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-10100t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BD11E86-B786-43C8-9B67-8F680CC30451\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-10100te:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D740D69-83B6-4DBF-8617-9B1E96DFF4FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-10105:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BB09ACB-EFFF-4C2F-BEB5-AE1EEDC1EC2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-10105f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8B15567-BFEA-43BE-9817-98A1F5548541\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-10105t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"984C7C7A-2F8E-4918-8526-64A080943E0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44BF0AFB-E9DC-4EA5-BFFF-48F896C655E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-10300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7AFC285-2248-45E7-9009-1402628F17E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-10300t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"078DAE1F-8581-44FB-83EA-575685928C4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-10305:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"887BEC29-AD0D-4BEB-B50B-F961629BBF23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-10305t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93859A03-DE41-4E7B-8646-93925ACBFC42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-10320:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FD8BD84-B6F9-48D5-8903-2C56C12EFFEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-10325:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9877F278-641B-4F83-B420-AB4E1018EA9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-11100he:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2ABF9AEE-BE1C-40EF-9E5F-6F3641BA7CDE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-1110g4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C60AF0D-983D-454E-8940-209C471DC041\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-1115g4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F26C6DA-ED6B-444A-A63A-5155FCA4F0DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-1115g4e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66BAF09D-8199-4579-B25A-E7C5177385E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-1115gre:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21EA30AA-713F-40AD-8C94-C1129198EE98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-1120g4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0D9B687-C3EE-4AF5-B9BE-7F0698D0F258\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-1125g4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"114DF43C-839F-4066-AA30-8DC16B1D6687\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-12100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A87E241-4E74-4F89-8E5A-1A3980A5DDDF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-12100f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4325860-834E-4042-BDB2-5EB5A2D0F1F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-12100t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0765F36F-94F8-45BE-8AF9-3373E5E567F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-1220p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC0F50A0-5F1D-4D30-B5F3-C94C44C323D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-12300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31A8AC04-8182-4BF2-9FDA-B2D607222EDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-12300t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"082596F0-6707-4175-A9CB-868D853F7362\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3-l13g4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39FD6F9C-FEEA-4D52-8745-6477B50AFB0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-10110y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62BFF15A-0C78-45BC-8E71-EDF624AC162D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-10200h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB69A6F1-9B4D-4CDA-8388-E7FCBB2163DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71615EAF-4DF4-4B9E-BF34-6ED0371A53D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"376B6DD7-1284-4BD9-88A4-5C34303CC5D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-10300h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"403E8A3A-28C2-4329-BF31-1A530E317959\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5F6F725-217C-48FF-86DD-E91A24156121\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"365696BF-CE3D-4CE6-92A8-413DDE43774E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8515D29-3823-4F9B-9578-8BB52336A2A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE048AEB-094D-4102-9DBF-488FEB53FF89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3907FA31-6F1A-45BA-ACF3-1C8EE05D9BA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D48D9F5F-95BD-4F6B-8A37-D1CAA7D2DB25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-10400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BF497A0-30BC-42A4-A000-C0D564D4872A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-10400f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3025301-52D3-43D7-B6AB-F3F0A5C882DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-10400h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B2A62F5-A8DF-4565-B89F-9C58B1FB8D94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-10400t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9466A6CC-8D69-4EB5-94E2-611297120462\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-10500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2D116C4-698B-45BC-8622-87E142B37922\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-10500t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36836EB0-99DD-4217-9182-1E9FC5656C42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-10500te:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD507601-CD6D-4F11-A4A7-790FB740B401\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-10505:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8C26205-C602-46F6-B611-424709325D6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-10600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"464587A0-9EAA-4DF5-AFEB-15F2FA9CD407\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-10600k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1940F59A-67FD-45F9-9C78-51A50687628F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-10600kf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B722E2A-1262-44FD-8F7C-F9A9A5C78744\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-10600t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DEFF6A7-0DE2-4BEE-80DC-BBAB259647AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-11260h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BCD9C35-95D0-49E6-A9AC-E3AA8CD3F7B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-11300h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B40E9EC2-A8A6-4800-9F9E-B1237832D6F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-1130g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"158CC66D-32E5-4396-8E5D-4D90EE9AB62C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-11320h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55227C1C-D6CE-40AD-A5AA-7143E0A7AEF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-1135g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E84F0381-296A-408E-90D4-A316EE894A9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-11400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"092E3E45-5F58-412F-BAC9-C3B5290D8349\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-11400f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EA7E6D0-0ADA-4BE1-8273-69AB3DE3BA36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-11400h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6FCAFC0-EEE2-43E4-AE90-1803588B5689\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-11400t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8640175-3BC2-4C7B-A5A3-51E5677EDECA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-1140g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7077CBF1-1FC8-4AF9-8B39-A15871FFD3CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-1145g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53D902B5-D135-4961-AED9-EA6DF06534B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-1145g7e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2910EB49-C9C6-4FC9-AA55-E7A0DAE28B93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-1145gre:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B858B433-9DA0-4224-B94C-4962FB3A4138\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-11500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F6B5FC3-8E55-430A-A55A-AF541690C576\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-11500h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55568460-F318-48FB-90E4-55CBBAF13E59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-11500t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7AFF680-DBC6-432E-A6DE-E7E7E4F2F26A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-1155g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADB84973-3DAC-4458-A817-943302F5EFF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-11600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B26C730-32FA-4D51-88FA-E724147147BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-11600k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFF7C5BF-E151-42DB-B0CF-E2589904C9A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-11600kf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E12D6BD2-7D32-4194-84D3-A0DE4B88BFF0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-11600t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3EC487F-B9A8-410F-AE1F-8D1B74BA77D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-12400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74A47464-BB99-44BB-A1B7-D8469BEAF408\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-12400f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12882E19-1107-48E7-9ECD-A2891B8900D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-12400t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"896688AD-84FF-4270-8F44-61764C0052B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-1240p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1646C42-B42B-451F-9B9D-AEE7CF74E9C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-12450h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9729F36E-F830-4397-8B0E-A91BF5601F76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-12500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FFEC0A8-69C2-4BE9-B510-5C111C6EE9BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-12500h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"047CB3C6-C53C-4BA5-AB1C-5D739B30F9FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-12500t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91BF3506-7257-4E37-98AC-DDF0283C1FA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-1250p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65E0B274-5CFA-481E-8355-64D7BC16D871\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-12600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CC5B69A-022B-4F8C-BAAC-97AFBAEA9730\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-12600h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63684C47-972B-45A3-9234-111F25FD35B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-12600k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28CE6C6D-7D12-4E4F-BB76-54BF1C0A7B97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-12600kf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A4AFFB3-6117-4BCC-BE63-814042823182\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-12600t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F880C0CA-815A-49D2-8BA6-F220E3E467D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-8200y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AC12E92-33CB-4603-AC14-3351CE1D4E3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-8210y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E62309E-1071-4569-8C9A-11748D629CAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-8265u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D3E166F-3D9F-4D0D-924A-147883598EA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-8310y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71294A32-F3DD-45EA-A0FC-C3EA0351FA29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-8365u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9054F35-AAB5-481E-B512-EDF4C3F2EA2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-9300h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A735A90-47E1-44C6-AE76-F6C7FFDCD4D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-9400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AC9F52F-6669-459A-A0A9-8F472E1F2761\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-9400f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7E91B92-4DB7-4866-8370-C6F8616D3D81\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-9400h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85F465BF-4548-45EB-AC40-384F4E6248EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-9600k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1DFFFEB-CC63-4F51-8828-C5D4E0287264\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-9600kf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B176D141-26B0-477E-B2DB-2E48D6FB82AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5-l16g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A4FD69F-FF53-43F4-97C8-40867DB67958\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"494A828B-F2BF-40CA-AAFB-7D2AF2BAF3AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD97F84B-ED73-4FFD-8634-10631FEE03EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6CDC1BE-6A64-425C-AF2C-7DFB28FB604A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D974FFFD-BBCC-444C-9EF1-AE478EEDB6E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2243674B-E505-4FED-B063-953A1569EA30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-10700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1978F85-5BA5-468E-B797-7FA7EB4F489D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-10700e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8D3D0CA-C981-4091-99F9-203DA8F156F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-10700f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EB23D0C-D2BC-4E7F-94AF-CAF171A64307\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CC9312B-40A7-4D4A-A61C-3BA865C29F63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-10700kf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EBECBE5-2BF0-4175-81CC-C6D054C819B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-10700t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB33CC4F-9D51-4A11-B063-6E78F0D71555\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-10700te:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7092B8E-DD3F-440D-B2AA-F0E5FC4A9725\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA491401-C484-4F77-ABF8-D389C94BF7B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66F8B600-B618-48E1-81EE-14A8A843F09F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42ADD367-82C8-4761-AEBA-A0200C5D1CEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AF75C0E-BA48-4C56-8398-109D06B5A5D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25329A6F-9D49-4EA7-B9FB-8C2FA5343475\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22921B65-513F-4ACE-80A2-4A31199BB5EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-11370h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63719B1D-5A98-44E3-80D8-CF0B4C1C6F80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-11375h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5365D3B-1B0B-416D-ACFB-23843FD25EAF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-11390h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2556EF0A-B29F-4E9E-BB77-955CBC851EFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-1160g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8F5409D-23C7-4CA9-951C-8EEEAE31DFDE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-1165g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5601E40A-96E1-4321-9682-055A1C607488\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-11700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF36D9CC-2FD8-4D08-8712-E625D4754613\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-11700f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3252CF19-9D1D-4A46-9C94-0E7255CDDD8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-11700k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E11C7F38-3313-4F6D-9D5D-E61C89E716B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-11700kf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70B0C976-3B68-4647-909A-5D574D711C7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-11700t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA18192E-7DBB-45BB-8568-CA7159AF8CE2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-11800h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2FDB568-5340-4DD8-B933-1CD64C370BD6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-1180g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D28DF93B-E15D-47D3-B9C0-4AEE8B7FADD0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-11850h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78F2DD1D-DB6F-44D1-BE3B-C798C09CC5F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-11850he:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"104B88E7-3B8F-4C4E-AD07-CAD1DCD7898B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-1185g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12ADA9A2-6E64-4F17-B369-816639F0D3BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-1185g7e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"514B7B5E-D60D-464A-8CB0-273044FD2E09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-1185gre:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFB608EE-83AF-4192-93E1-7DDBA5F6A54C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-1195g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B807B5D8-BCDB-4398-8ADC-DBD1BD8D2B88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-1260p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"989B6E1C-7681-4A11-B9F4-D94C47D57BFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-12650h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F75A1B08-CE1F-47A5-B706-104A62861932\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-12700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E458521-2BD9-4719-9F83-6ECC3BC19B70\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-12700f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B8762D1-5333-4EED-B31E-338052061237\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-12700h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67DCFA7E-734D-4FE0-913E-74D85564ABE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-12700k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEF502AE-BD3F-461B-9476-FB04818DA1F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-12700kf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"445022AC-A3CD-402E-AF44-2C1BC2B790E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-12700t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF63765B-1BAE-4B53-9BA8-FDFDD2C58417\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-1270p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D78245E2-BE22-4BD5-9252-44FF5815D7CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-12800h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E1DF00E-1B1A-4FCA-BEEF-7D2BF9F001A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-1280p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91A093D4-A800-4F28-8480-85D62068CB35\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-7640x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F946429E-3362-41E5-88D9-FA01BE8D4312\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-7740x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E9EF2F2-750C-4CB7-9858-69D7FFA4EF31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-7800x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8580A81E-8BDE-4EB5-B830-6AA7550A25C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-7820x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43756EB8-9F85-4499-99F0-43E69CA3F470\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"957F3AC9-D071-4932-B2C9-1643FB78BC7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F41025AC-6EFE-4562-B1D1-BAB004875B06\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34DD3CCB-91D5-48D6-80BC-CA643385BCE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-9700k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FB0C1DA-60C6-4C9E-99D6-7A47696DACD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-9700kf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2EB81B1-7DEF-4CC3-ADC9-A4CB1042E406\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-9750hf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31CD303F-AAE9-4635-987D-742031232BDD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7-9850h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D0320CB-05E3-4D5B-BCEF-D862566B0AA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-10850h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D48C9306-80AD-40CC-9516-E1B6F5A63556\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-10850k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39F9F143-0AB4-4302-82B8-B4EA790EB08D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-10885h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE73B0A0-E275-449D-8ADD-86AE188DE82A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-10900:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE06C64A-1610-4340-98CF-AC91258AB215\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-10900e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C27F79F3-EA0A-429C-8DA9-BC276A94AFB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-10900f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B07609EB-E10B-4253-938E-81566036D81B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-10900k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9B7AEF3-7A62-43B2-8F0C-70E5A2CDB29A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-10900kf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CC44D69-AAAB-4524-9D12-F1A606D57831\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-10900t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D23D2887-1246-4EA4-B8B6-57BC7FB869E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-10900te:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEFC46D5-B23D-4513-9669-4DC53662F87B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-10900x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B93E897C-5D7B-4532-99D9-53192A1F776A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-10920x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33D0D618-D738-47F5-B7F7-C7F07972C893\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-10940x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7A147E8-0778-49CE-92EF-ED1950138528\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-10980hk:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D264277-00CB-4FCC-ADAA-38536609D0F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-11900:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CC25725-73F6-4948-B17A-A05E8978EB78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-11900f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D9BFA32-89B3-4E26-B980-2694B5378D8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-11900h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65E2A7C5-78D9-4F75-B8A2-5EB3ECEFBFF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-11900k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2D04A37-79EE-467B-BD8A-0CA0BDD85F0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-11900kf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FECF6BE-2CED-4510-91C5-195686C9C421\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-11900t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B903E2A0-EE73-4F13-AB26-8F5644462E94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-11950h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"170B497C-05F2-46B5-92CD-ACF7C0BE1711\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-11980hk:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EEF53EA8-8EB4-455C-A986-405DBB122D3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-12900:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D6A5B34-780D-46F2-8DC8-F310F9201FE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-12900f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6D78411-A542-48D7-B840-22290B3A98A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-12900h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86AABCC6-4CA4-4A2D-9DC6-D0AD6FF99BB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-12900hk:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58A1375C-4B33-4557-9BA0-D03EAC350D86\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-12900k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"783F6EC3-354C-4501-9557-E1BFFC0852DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-12900kf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC8F48DC-E327-4B3D-BA52-901D21A6412E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-12900t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82004D25-6F97-4549-B98E-148E44134529\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-7900x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B97260E-1D7A-45B5-AD86-EBF8CA259FE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-7920x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58002875-D63D-4ABD-A8B7-DCAEB7E94AE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-7940x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAC07903-D4B7-423F-9F79-7DF45E5350BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-7960x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FBC4FB5-7C2D-4E10-80BB-3951FFA3A6CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-9800x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B32C5EE-D845-471C-85EA-DA5F9B04F01B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-9820x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D93CC48C-DCCB-442A-98D5-3165CCFAE7F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-9880h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"659206BB-510A-47F8-8B6E-FD030A6BE1DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-9900k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C3257F5-CA55-4F35-9D09-5B85253DE786\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-9900kf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6F8CEA0-1CD6-4F17-85E3-C1CB04D9833A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-9900x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"655E770E-B9EE-4B08-B1EE-F393C7F68941\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-9920x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBC47200-8F3F-4969-AABA-39F4B1E4E263\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-9940x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EB17629-2454-478B-8E1A-AC2D2FC2233C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-9960x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A28B6DE9-D383-4CA2-94D5-4C9CFF95E01E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i9-9980hk:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A48A2969-DC53-48E2-A5CA-4DF2B00D1960\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_m3-8100y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5AFFC8B-3AC1-49B4-9A73-18A3EC928591\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_7505:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD6B51B5-96AA-44C8-9539-9D7F67143DC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g6400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A263FA56-5F1F-4E91-A354-38648E130685\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g6400t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D24E8214-881A-4C15-A544-FB3FD5D14DCA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g6405:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1EDE72E-3734-4FB5-BC77-B7C3838D41F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g6405t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E07450B-D81B-474D-9150-C9D8A62D44A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g6405u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E78C7A9B-7DCE-416F-909E-B3CC52AEBE9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g6500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A892B60-7FD3-41A6-9997-586B76757416\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g6500t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4701D592-F06C-4713-9736-19DB130B5E2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g6505:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3E6063A-23C9-4845-B575-5D330B6C68F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g6505t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D50C73A4-D52E-4560-B725-61F416E18505\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g6600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25570E2C-BBE9-402F-9631-FA5014767CE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g6605:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D59D57C2-CFB5-486E-A340-E63C7D7A8B6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g7400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"998DCE68-F426-47C5-80F7-BFE42FD69DFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g7400t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FBE04ADB-3037-41E8-8DF4-8588FDFB759A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_j4205:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6585755-C56C-4910-A7D5-B2153396AC7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_j6425:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D97C7A90-D8C6-4901-BCA1-E40DA173AA9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_n4200:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A944A8C-462E-4FF9-8AD6-1687297DD0DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_n4200e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5378FE6C-251A-4BCD-B151-EA42B594DC37\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_n6415:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"638FA431-71EA-4668-AFF2-989A4994ED12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_silver_j5005:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC903FA4-2C4E-4EBB-8BFA-579844B87354\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_silver_j5040:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"667F2E6C-C2FD-4E4B-9CC4-2EF33A74F61B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_silver_n5000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DF16D51-5662-47C3-8911-0FACEEDB9D80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_silver_n5030:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECC4430E-E4B1-454F-8C95-6412D34454C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_silver_n6000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31282347-8DCB-4B37-A853-DFD9D5AF31EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_silver_n6005:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42841FAC-A6EC-44F3-9FCD-B4549A783014\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:puma_7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5707E22-2D01-4A48-BB2E-0C284C2B424C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_bronze_3204:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E687CADE-6E49-4284-BD41-6CA2FDD846FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_bronze_3206r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A7540F0-7EB8-4F64-AA31-9AF3D79BEC46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d1700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D94D7B29-565F-4E62-A958-27FFDDD7399E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_d2700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"594DDCAB-96D4-4999-824E-7597B971B6DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2278g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63650DBF-4DBD-4655-AE93-5CBE53F8E0FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2278ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00912C9C-D386-445E-B390-E96361ECDFA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2278gel:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60B582A1-784C-4BE8-A0D5-706DE01D769E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2286m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"556637E1-9502-41E7-B91D-082C92F233A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2288g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EA930BC-EF68-4AD5-AA1B-0659358028D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2314:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A8EA870-2228-4E81-A417-30E040A5C0E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2324g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"656D31B6-1E8D-4A44-9D7A-023051E7050A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2334:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49EEE5AA-3867-4137-B165-5004C34C77B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2336:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2A38417-1DB2-4C85-80D9-D3968BF7A83B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2356g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F74E9E4-F84C-4B7F-8A42-20EEC60986DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2374g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74F99F83-A7E6-4AFD-BC42-7348EF6613AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2378:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A62A9F4-2B98-4F2D-9143-08D1689E38AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2378g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8FD06CB-F456-44BD-900B-06131DC68B6B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2386g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9044310E-4DF9-47BA-9D05-C1405DC8CDB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2388g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA881CDA-1C16-43F1-A7D5-69502512A21C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5215:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DA109ED-BC4D-4F70-81B2-3CE0E2B3D9DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5215l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"070C20AB-66F2-4EE2-8134-5E40DBB9B9E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5217:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CA49CF7-C6BE-4337-A0A8-A603D8955EE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5218:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C8F7F6B-847A-479D-B6B1-BBA331D06DE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5218b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C375A9D-C7CE-49A6-B08D-9CAB22E16D32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5218n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF8D06DC-6B8A-4B7B-BB3E-778D432CFEF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5218r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E06531E6-126A-4FBB-BEBB-F9023C4738F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5218t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93B8CDF0-1489-4E4C-B004-A22E06FC10D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5220:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6ACF161-472E-4088-85C2-5940C9C88D45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5220r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E0B94F6-EC15-4C12-8BA5-CC6602A7A725\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5220s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"067C65E5-5392-4DAF-A6BD-640D78C19CE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5220t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1647DAC-CED6-4DAF-8F82-A42D6D691DF0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5222:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D93CC498-F558-4C2F-9E14-7897060CA9FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5315y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6839AE9B-9A8A-4312-80FC-0549C675A815\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5317:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E0E7358-1EC1-43DA-99B3-A2D6D57E0121\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5318h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43808CCF-1EF0-41CE-983D-DD6BB775895E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5318n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2C5D3DE-5506-4F16-B7F9-5032A1277D23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5318s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED598260-2A9B-46F7-AA85-0DA97DA0D42D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5318y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06F1CFD2-8F32-4CE8-9D9B-C65B332775B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5320:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DD98889-58A1-4A5A-B79A-B2DA9EDA63DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5320h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BF1F73B-4736-40BC-9053-951B5BF1059E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5320t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDA47606-176C-4F6B-A316-4C536B63FA4E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6208u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76D48CFC-1322-4C53-8B53-88E7ACC724BE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6209u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F6456D0-32AE-44A9-9F63-AD64B5E49182\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6210u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38EA99F9-22C2-47ED-9DDD-928E19C4C51E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6212u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F8867B2-F297-4D30-AD43-77B0F67FAE3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6222v:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"178345A5-9A38-4C8F-B3BB-430276FA4998\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6226:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"831A7D63-4638-480C-94CB-ED06613BA75C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6226r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"178D9E36-79EC-4672-8E46-0FD6597CA1CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6230:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EED0D492-ADAB-41ED-A283-024D3CED441F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6230n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BBB5A97-EA4F-454C-819C-DE1CE7018E7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6230r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9733E69-E7CF-444C-B72C-AC8E5DEF2449\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6230t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FD24563-9157-4DE1-95ED-D4E3E879219E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6234:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F83F8602-6679-4B3C-BBDD-3BDB2B317F70\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6238:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CD3E45C-1943-42BA-9F6D-EA64D67BF954\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6238l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF7B4C84-1258-4F2F-B8A3-55353B3D13BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6238r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B27F755-4C38-4469-8A9D-C9266BDA53ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6238t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E21977E-7085-46C5-8E89-F952C2EBCE04\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6240:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB72D13B-5880-4CB2-8E80-CB6A39B5A302\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6240l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02BCB7D2-4B68-4FF8-BFC9-06C39A708C62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6240r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AAF31FBF-20FB-4B8A-ADE1-E29BB8B8A702\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6240y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BF7298E-BC07-4C42-8F9C-C3B0CDFC86C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6242:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C8292CC-DACB-489A-BCB2-73DC2C6F944C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6242r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D83AEDF-2671-4278-8088-BA517192AB3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6244:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF72F37A-2F28-40E6-A84B-0E1DF63B1812\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6246:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8C1742C-96CC-4BCA-928E-D6B53ED2DB0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6246r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3EAE9CE6-DA95-40B0-AE65-656FA4603D1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6248:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAD0B5C3-633D-4F2A-8D56-8FA83F1B581C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6248r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5241B3E0-F968-4B16-8BF8-191C6F7B224A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6250:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EFB52DD-5B7D-45BA-B249-A134D1B9EBD3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6250l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B82FC910-F3AB-42BF-9740-EC09F0AC179D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6252:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BAE2B11-B0F5-415F-BD6B-E285EF9C9095\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6252n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BA58EFB-7672-4902-ABC1-65217AA617AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6254:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96E2764D-7D6A-4CE0-A628-FFE966A6462F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6256:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D66D18C-17F2-4259-B1D8-7C63797A024C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6258r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25C8DFB5-9D8B-4370-849A-DC061910E54F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6262v:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B704835-1250-44E1-923C-5DE2F4DD25D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6312u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF7D9572-8D03-4D54-B0E1-C0A3F3F90FCF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6314u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE3CA224-B5DE-4451-9CF9-929ABEA242EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6326:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3D8E340-AE91-4F29-9F22-E0CE6718FC13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6328h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"710DBCD5-788D-4140-AC16-EC6E126CFA66\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6328hl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A767EC83-AAED-4FEA-A35E-A503369FE4FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6330:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB1ACDED-85B4-4A11-BD03-8E1B9563B7F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6330h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6C4A47D-7F66-4ACC-9C69-0A355D46CDC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6330n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20821868-F7D2-4132-8D63-98E1089DB46C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6334:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4EB9295A-8832-4670-B268-FBD0BC086447\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6336y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"489BD4AC-50C6-422B-A2B2-00A70E611114\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6338:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5694238-F4E5-4689-ADD2-67C25762ED92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6338n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A57D44C0-AA8D-46B0-8923-ADB312E3937F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6338t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A551BBB-76CD-4C26-913F-B02C66E5D846\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6342:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A4A44F2-68BF-4709-946B-C976DA3A9C7E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6346:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"038AC553-5523-4687-843D-6FEA7264EDEA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6348:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DE5D09C-3272-4810-9F41-97BDBBFE4160\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6348h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59C5122F-D822-4E71-A417-88EB51F1786B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6354:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F14C3438-B876-45B9-85F5-61354207AF8A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8253:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94A6DA7A-7C97-40E1-B31A-B92BB658C429\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8256:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54AF128B-9984-4C91-B7F6-968DE376C3BE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8260:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28B167F1-63FA-4C86-84AB-836ABF84E6E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8260l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"955420F9-3A3F-40E0-9940-DD43C5C78D62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8260y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC4A437C-6C00-4729-91CC-D27EB3542633\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8268:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74ED727D-B1A9-4F4B-92C7-3F00F3A80013\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8270:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2C24951-B3FA-48E6-AFAC-6CA0D2348230\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8276:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"185E8FBC-9EE9-472E-867B-0B0DEEECA13E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8276l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB3C00A0-C28A-46EB-853D-DAE3819399D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8280:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0951DB50-AC8E-4C17-A2A9-DD4A198C4DD2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8280l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0CAB607-87B2-49F4-9FAB-662D5EA3D11C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8351n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7C504C3-7EEE-4A0F-8589-19C1E806E690\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8352m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5230F6AF-88CB-4EE2-B292-8B9A7217D10F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8352s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B45C39D-03E8-46C1-88DD-94E382F4A961\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8352v:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF2DC691-025A-441E-AAC2-C8583F54733D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8352y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8FB7EE6-6808-4879-A0A3-E85FE5CB37CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8353h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBE07EA7-4CDF-4038-A948-6AC126C7F6AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8354h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06A2241C-37AE-41AE-A8D1-D9AB18CCE16D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8356h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB6DEAA1-3209-4B49-B931-43E8C1C5BE14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8358:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCE086F8-5C8B-4F0C-B53A-76BD4E67B678\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8358p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00B21B5C-0FDE-4A8E-A9FC-5CF822A74B20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8360h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB15368B-21A1-429E-8B9C-A095C4E8BA67\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8360hl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA925F96-6DDD-4F71-BF13-710C8A89D860\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8360y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E41414A-6B0B-4511-A9A1-7FF99DD25DB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8362:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91EB66B4-8F1B-4F35-9371-17FB761997CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8368:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBDFD1AF-2716-4C95-ADFF-79EFA915C286\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8368q:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5390A12B-80BD-4889-BF0F-95E65D10D037\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8376h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1D6444A-B9CF-4D70-A8A9-E6B57B6F13DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8376hl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05637A96-AF09-4FF5-A918-AB369AA2D1CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8380:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33FA0279-D587-471E-8EC0-211F78DA4DFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8380h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1CC27DB-11D4-412A-BC69-CF32A0CABCF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8380hl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8FE9694-F0E7-4B45-82A1-065DA96B9794\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_9221:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBC93757-5FD7-403D-B5ED-CC8793002352\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_9222:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A7019D4-58E0-4B73-93B8-D3B0E86BF2D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_9242:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DF8D8C4-29EA-4D09-87AB-A570403BA0E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_9282:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89421EC5-52E5-441F-AD3B-5C5E964F836D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4208:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA909754-B60A-4B30-AF42-4C8734E155AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4209t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBEFB056-0872-434B-9630-28A1AAEAD470\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4210:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21A62CB9-FB01-45CB-9E10-E72D87C0E1F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4210r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD8EBFCC-AD76-4285-93BD-D14219C6EA5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4210t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FF7E334-6DC7-44B5-A102-649A68300C80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4214:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1B4F7FE-61A3-417A-BAA9-E686A76F3A94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4214r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DE4C87E-CB23-4804-9BBD-2533C5E1D6D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4214y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7305838B-84CA-4BB8-A350-B2D2844F1041\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4215:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D356D196-8AB0-4387-A644-C5E68174A60C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4215r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89587A92-6234-40C3-83DB-F72319FFBC79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4216:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F50C03E-CBEB-4738-BDF4-DC296CE9DFA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4309y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB267830-FA6E-4C2E-8BBE-C3DA12A6A33D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4310:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D557D68C-8279-4BFD-9EA6-17A83754B8FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4310t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7ECA0BC9-1CA4-4B95-B98F-9098B2550309\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4314:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1298CF87-124D-450B-928D-F39CCA2BAF42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4316:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF12820F-A2BE-44BF-A85D-7F4623898DAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-10855:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65A473FF-F3AD-41F5-B63A-3D6DDB0BD216\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-10855m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"853DE44A-84C9-4959-865F-D538DF895647\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-10885m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13326C69-C160-482F-BF28-5425B57BE738\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-11155mle:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F15EF0E-37CF-4944-8B6B-A82B4348CDC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-11155mre:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92D12220-840B-4397-889C-9649F34B7E25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-11555mle:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AB926B2-077B-4752-80EC-D39446115FCD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-11555mre:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8C1D750-1FE9-40F8-BCB9-77D13C13906C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-11855m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D07040D2-2ADC-4CC4-860F-74A7C64FD6FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-11865mld:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D2ED18E-241E-4154-9793-FB0E60F9C00F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-11865mre:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D59D80E8-5A2C-402F-8AE3-766ECEDA14F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-11955m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F66D2E5-BD5B-406D-82A0-4E1E32EDC337\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-1250:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"557E240A-6760-434E-9C3A-1E5E9129912D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-1250p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B7565F3-5D41-4A1F-948B-1A55E3AD3EF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-1270:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C71A52C1-1FBF-4730-8234-700F87D5E74D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-1270p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B930DF9-C425-41AF-9736-0BD611C79CA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-1290:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DF260A0-CDD8-4EE1-B3F4-73CD02FDCD11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-1290e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B84F7DC-EE67-4748-8AE2-7070A6F79BAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-1290p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C156433-48A3-4B2E-A8DB-AF1F09B2EFA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-1290t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D78A1CFF-F05E-429C-A9AA-935078574A3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-1290te:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE28AD41-2287-4F2B-924C-30B66A320443\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-1300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE3A7AD3-D7D4-40A5-B1B6-A818B5ACE6D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-1350:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E31FFECA-F663-4B59-9800-1C6A8BD84626\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-1350p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3F194D4-9425-470E-B812-CD92B5C5A68A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-1370:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E426811-F97D-42CE-B06D-41CDA84E1B55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-1370p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F5F5950-C21F-4142-BA1E-E074FAF249F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-1390:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2BC8A89-4CF3-473B-9251-9FA5FF8ADBD6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-1390p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30EE6B10-84FC-4D9D-8F39-4B7000CC85AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-1390t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AFDA5D5-F00F-40CC-B492-C433200A491C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-2223:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"708D6E00-A2E5-4B08-88E7-C872ACFC341D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-2225:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CD8EE0E-2BA3-49DD-91D1-81AB67F16475\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-2235:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC75E5CF-4241-45A8-AD45-1F7F077CEEA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-2245:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D132291B-AADD-49E3-ADD6-333E1F1D8DFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-2255:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2ADF328B-D286-4C36-9F21-11A58D55D03A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-2265:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6D23470-A702-426D-A63C-4F7BAC158762\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-2275:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"750A77C5-1367-4E04-9ABF-1AB2D46C29C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-2295:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1340A29-3428-4FAD-AA07-7F625915E34D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-3223:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADA1FA19-A836-4D6A-8C2D-718ECE6866D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-3225:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3ECEBDB0-2E0A-416B-9737-82C1FC65A06C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-3235:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C39B6A99-7060-4011-8FA3-E5ABE5C02813\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-3245:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF9E723E-1095-424E-A90D-380CA0D2795E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-3245m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35380FB9-90FF-405F-8E2E-01C1DD209540\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-3265:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2215D655-0EA9-4530-AB68-7B1C7360D692\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-3265m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"020B6FED-EAE2-478C-8FF4-CB75F24E9A9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-3275:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE519C62-F5BB-461C-91EF-2979CD506C63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_w-3275m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F693457C-3529-4E62-A672-1B862F235D0F\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EDB6772-7FDB-45FF-8D72-952902A7EE56\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9955F62A-75D3-4347-9AD3-5947FC365838\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_cloud_native_core_policy:22.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A6D77C7-A2F4-4700-AB5A-3EC853496ECA\"}]}]}],\"references\":[{\"url\":\"http://www.openwall.com/lists/oss-security/2022/03/18/2\",\"source\":\"secure@intel.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20220818-0004/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpujul2022.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/03/18/2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20220818-0004/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpujul2022.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2022/03/18/2\", \"name\": \"[oss-security] 20220318 Xen Security Advisory 398 v2 - Multiple speculative security issues\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"]}, {\"url\": \"https://www.oracle.com/security-alerts/cpujul2022.html\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20220818-0004/\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T23:18:41.442Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 6.5, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-0002\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-04-23T13:21:05.799722Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"description\": \"CWE-noinfo Not enough information\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-05-05T13:13:09.454Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"n/a\", \"product\": \"Intel(R) Processors\", \"versions\": [{\"status\": \"affected\", \"version\": \"See references\"}]}], \"references\": [{\"url\": \"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2022/03/18/2\", \"name\": \"[oss-security] 20220318 Xen Security Advisory 398 v2 - Multiple speculative security issues\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"]}, {\"url\": \"https://www.oracle.com/security-alerts/cpujul2022.html\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20220818-0004/\", \"tags\": [\"x_refsource_CONFIRM\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \" information disclosure \"}]}], \"providerMetadata\": {\"orgId\": \"6dda929c-bb53-4a77-a76d-48e79601a1ce\", \"shortName\": \"intel\", \"dateUpdated\": \"2022-08-18T14:09:32.000Z\"}, \"x_legacyV4Record\": {\"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"version\": {\"version_data\": [{\"version_value\": \"See references\"}]}, \"product_name\": \"Intel(R) Processors\"}]}, \"vendor_name\": \"n/a\"}]}}, \"data_type\": \"CVE\", \"references\": {\"reference_data\": [{\"url\": \"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html\", \"name\": \"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html\", \"refsource\": \"MISC\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2022/03/18/2\", \"name\": \"[oss-security] 20220318 Xen Security Advisory 398 v2 - Multiple speculative security issues\", \"refsource\": \"MLIST\"}, {\"url\": \"https://www.oracle.com/security-alerts/cpujul2022.html\", \"name\": \"https://www.oracle.com/security-alerts/cpujul2022.html\", \"refsource\": \"MISC\"}, {\"url\": \"https://security.netapp.com/advisory/ntap-20220818-0004/\", \"name\": \"https://security.netapp.com/advisory/ntap-20220818-0004/\", \"refsource\": \"CONFIRM\"}]}, \"data_format\": \"MITRE\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.\"}]}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \" information disclosure \"}]}]}, \"data_version\": \"4.0\", \"CVE_data_meta\": {\"ID\": \"CVE-2022-0002\", \"STATE\": \"PUBLIC\", \"ASSIGNER\": \"secure@intel.com\"}}}}", "cveMetadata": "{\"cveId\": \"CVE-2022-0002\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-05T16:44:17.326Z\", \"dateReserved\": \"2021-10-15T00:00:00.000Z\", \"assignerOrgId\": \"6dda929c-bb53-4a77-a76d-48e79601a1ce\", \"datePublished\": \"2022-03-11T17:54:36.000Z\", \"assignerShortName\": \"intel\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
suse-su-2022:0939-1
Vulnerability from csaf_suse
Published
2022-03-23 09:41
Modified
2022-03-23 09:41
Summary
Security update for xen
Notes
Title of the patch
Security update for xen
Description of the patch
This update for xen fixes the following issues:
Transient execution side-channel attacks attacking the Branch History Buffer (BHB),
named 'Branch Target Injection' and 'Intra-Mode Branch History Injection' are now mitigated.
- CVE-2022-0001, CVE-2022-0002, CVE-2021-26401: BHB speculation issues (bsc#1196915).
Patchnames
SUSE-2022-939,SUSE-SLE-SDK-12-SP5-2022-939,SUSE-SLE-SERVER-12-SP5-2022-939
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "This update for xen fixes the following issues:\n\nTransient execution side-channel attacks attacking the Branch History Buffer (BHB),\nnamed \u0027Branch Target Injection\u0027 and \u0027Intra-Mode Branch History Injection\u0027 are now mitigated.\n\n- CVE-2022-0001, CVE-2022-0002, CVE-2021-26401: BHB speculation issues (bsc#1196915).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-939,SUSE-SLE-SDK-12-SP5-2022-939,SUSE-SLE-SERVER-12-SP5-2022-939", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0939-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:0939-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220939-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:0939-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010506.html" }, { "category": "self", "summary": "SUSE Bug 1196915", "url": "https://bugzilla.suse.com/1196915" }, { "category": "self", "summary": "SUSE CVE CVE-2021-26401 page", "url": "https://www.suse.com/security/cve/CVE-2021-26401/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0001 page", "url": "https://www.suse.com/security/cve/CVE-2022-0001/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0002 page", "url": "https://www.suse.com/security/cve/CVE-2022-0002/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2022-03-23T09:41:03Z", "generator": { "date": "2022-03-23T09:41:03Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:0939-1", "initial_release_date": "2022-03-23T09:41:03Z", "revision_history": [ { "date": "2022-03-23T09:41:03Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-4.12.4_20-3.61.1.aarch64", "product": { "name": "xen-4.12.4_20-3.61.1.aarch64", "product_id": "xen-4.12.4_20-3.61.1.aarch64" } }, { "category": "product_version", "name": "xen-devel-4.12.4_20-3.61.1.aarch64", "product": { "name": "xen-devel-4.12.4_20-3.61.1.aarch64", "product_id": "xen-devel-4.12.4_20-3.61.1.aarch64" } }, { "category": "product_version", "name": "xen-doc-html-4.12.4_20-3.61.1.aarch64", "product": { "name": "xen-doc-html-4.12.4_20-3.61.1.aarch64", "product_id": "xen-doc-html-4.12.4_20-3.61.1.aarch64" } }, { "category": "product_version", "name": "xen-libs-4.12.4_20-3.61.1.aarch64", "product": { "name": "xen-libs-4.12.4_20-3.61.1.aarch64", "product_id": "xen-libs-4.12.4_20-3.61.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-4.12.4_20-3.61.1.aarch64", "product": { "name": "xen-tools-4.12.4_20-3.61.1.aarch64", "product_id": "xen-tools-4.12.4_20-3.61.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-domU-4.12.4_20-3.61.1.aarch64", "product": { "name": "xen-tools-domU-4.12.4_20-3.61.1.aarch64", "product_id": "xen-tools-domU-4.12.4_20-3.61.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "xen-libs-64bit-4.12.4_20-3.61.1.aarch64_ilp32", "product": { "name": "xen-libs-64bit-4.12.4_20-3.61.1.aarch64_ilp32", "product_id": "xen-libs-64bit-4.12.4_20-3.61.1.aarch64_ilp32" } } ], "category": "architecture", "name": "aarch64_ilp32" }, { "branches": [ { "category": "product_version", "name": "xen-devel-4.12.4_20-3.61.1.i586", "product": { "name": "xen-devel-4.12.4_20-3.61.1.i586", "product_id": "xen-devel-4.12.4_20-3.61.1.i586" } }, { "category": "product_version", "name": "xen-libs-4.12.4_20-3.61.1.i586", "product": { "name": "xen-libs-4.12.4_20-3.61.1.i586", "product_id": "xen-libs-4.12.4_20-3.61.1.i586" } }, { "category": "product_version", "name": "xen-tools-domU-4.12.4_20-3.61.1.i586", "product": { "name": "xen-tools-domU-4.12.4_20-3.61.1.i586", "product_id": "xen-tools-domU-4.12.4_20-3.61.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "xen-4.12.4_20-3.61.1.x86_64", "product": { "name": "xen-4.12.4_20-3.61.1.x86_64", "product_id": "xen-4.12.4_20-3.61.1.x86_64" } }, { "category": "product_version", "name": "xen-devel-4.12.4_20-3.61.1.x86_64", "product": { "name": "xen-devel-4.12.4_20-3.61.1.x86_64", "product_id": "xen-devel-4.12.4_20-3.61.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.12.4_20-3.61.1.x86_64", "product": { "name": "xen-doc-html-4.12.4_20-3.61.1.x86_64", "product_id": "xen-doc-html-4.12.4_20-3.61.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.12.4_20-3.61.1.x86_64", "product": { "name": "xen-libs-4.12.4_20-3.61.1.x86_64", "product_id": "xen-libs-4.12.4_20-3.61.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.12.4_20-3.61.1.x86_64", "product": { "name": "xen-libs-32bit-4.12.4_20-3.61.1.x86_64", "product_id": "xen-libs-32bit-4.12.4_20-3.61.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.12.4_20-3.61.1.x86_64", "product": { "name": "xen-tools-4.12.4_20-3.61.1.x86_64", "product_id": "xen-tools-4.12.4_20-3.61.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.12.4_20-3.61.1.x86_64", "product": { "name": "xen-tools-domU-4.12.4_20-3.61.1.x86_64", "product_id": "xen-tools-domU-4.12.4_20-3.61.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP5", "product": { "name": "SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.12.4_20-3.61.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_20-3.61.1.aarch64" }, "product_reference": "xen-devel-4.12.4_20-3.61.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.12.4_20-3.61.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_20-3.61.1.x86_64" }, "product_reference": "xen-devel-4.12.4_20-3.61.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.12.4_20-3.61.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:xen-4.12.4_20-3.61.1.x86_64" }, "product_reference": "xen-4.12.4_20-3.61.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.12.4_20-3.61.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.4_20-3.61.1.x86_64" }, "product_reference": "xen-doc-html-4.12.4_20-3.61.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.12.4_20-3.61.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.4_20-3.61.1.x86_64" }, "product_reference": "xen-libs-4.12.4_20-3.61.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.12.4_20-3.61.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.4_20-3.61.1.x86_64" }, "product_reference": "xen-libs-32bit-4.12.4_20-3.61.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.12.4_20-3.61.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.4_20-3.61.1.x86_64" }, "product_reference": "xen-tools-4.12.4_20-3.61.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.12.4_20-3.61.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.4_20-3.61.1.x86_64" }, "product_reference": "xen-tools-domU-4.12.4_20-3.61.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.12.4_20-3.61.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.4_20-3.61.1.x86_64" }, "product_reference": "xen-4.12.4_20-3.61.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.12.4_20-3.61.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.4_20-3.61.1.x86_64" }, "product_reference": "xen-doc-html-4.12.4_20-3.61.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.12.4_20-3.61.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.4_20-3.61.1.x86_64" }, "product_reference": "xen-libs-4.12.4_20-3.61.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.12.4_20-3.61.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.4_20-3.61.1.x86_64" }, "product_reference": "xen-libs-32bit-4.12.4_20-3.61.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.12.4_20-3.61.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.4_20-3.61.1.x86_64" }, "product_reference": "xen-tools-4.12.4_20-3.61.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.12.4_20-3.61.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.4_20-3.61.1.x86_64" }, "product_reference": "xen-tools-domU-4.12.4_20-3.61.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-26401", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-26401" } ], "notes": [ { "category": "general", "text": "LFENCE/JMP (mitigation V2-2) may not sufficiently mitigate CVE-2017-5715 on some AMD CPUs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:xen-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_20-3.61.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_20-3.61.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-26401", "url": "https://www.suse.com/security/cve/CVE-2021-26401" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2021-26401", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2021-26401", "url": "https://bugzilla.suse.com/1196901" }, { "category": "external", "summary": "SUSE Bug 1209630 for CVE-2021-26401", "url": "https://bugzilla.suse.com/1209630" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:xen-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_20-3.61.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_20-3.61.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:xen-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_20-3.61.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_20-3.61.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-23T09:41:03Z", "details": "moderate" } ], "title": "CVE-2021-26401" }, { "cve": "CVE-2022-0001", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0001" } ], "notes": [ { "category": "general", "text": "Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:xen-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_20-3.61.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_20-3.61.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0001", "url": "https://www.suse.com/security/cve/CVE-2022-0001" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2022-0001", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2022-0001", "url": "https://bugzilla.suse.com/1196901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:xen-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_20-3.61.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_20-3.61.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:xen-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_20-3.61.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_20-3.61.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-23T09:41:03Z", "details": "moderate" } ], "title": "CVE-2022-0001" }, { "cve": "CVE-2022-0002", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0002" } ], "notes": [ { "category": "general", "text": "Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:xen-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_20-3.61.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_20-3.61.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0002", "url": "https://www.suse.com/security/cve/CVE-2022-0002" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2022-0002", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2022-0002", "url": "https://bugzilla.suse.com/1196901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:xen-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_20-3.61.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_20-3.61.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:xen-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.4_20-3.61.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_20-3.61.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_20-3.61.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-23T09:41:03Z", "details": "moderate" } ], "title": "CVE-2022-0002" } ] }
suse-su-2022:0761-1
Vulnerability from csaf_suse
Published
2022-03-09 13:27
Modified
2022-03-09 13:27
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP5 RT kernel was updated to receive various security and bugfixes.
- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).
- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).
- CVE-2022-0847: Fixed a vulnerability were a local attackers could overwrite data in arbitrary (read-only) files (bsc#1196584).
- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)
- CVE-2022-0644: Fixed a denial of service by a local user. A assertion failure could be triggered in kernel_read_file_from_fd() (bsc#1196155).
- CVE-2021-44879: In gc_data_segment() in fs/f2fs/gc.c, special files were not considered, which lead to a move_data_page NULL pointer dereference (bsc#1195987).
- CVE-2022-24959: Fixed a memory leak in yam_siocdevprivate() in drivers/net/hamradio/yam.c (bsc#1195897).
- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
The following non-security bugs were fixed:
- Bluetooth: bfusb: fix division by zero in send path (git-fixes).
- EDAC/xgene: Fix deferred probing (bsc#1114648).
- IB/rdmavt: Validate remote_addr during loopback atomic tests (bsc#1114685).
- NFSv4.x: by default serialize open/close operations (bsc#1114893 bsc#1195934). Make this work-around optional
- NFSv42: Do not fail clone() unless the OP_CLONE operation failed (git-fixes).
- NFSv42: Fix pagecache invalidation after COPY/CLONE (git-fixes).
- NFSv4: Handle case where the lookup of a directory fails (git-fixes).
- NFSv4: nfs_atomic_open() can race when looking up a non-regular file (git-fixes).
- PCI: Add function 1 DMA alias quirk for Marvell 88SE9125 SATA controller (git-fixes).
- RDMA/bnxt_re: Fix query SRQ failure (bsc#1050244).
- RDMA/mlx5: Set user priority for DCT (bsc#1103991).
- RDMA/netlink: Add __maybe_unused to static inline in C file (bsc#1046306).
- crypto: af_alg - get_page upon reassignment to TX SGL (bsc#1195840).
- cxgb4: fix eeprom len when diagnostics not implemented (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- e1000e: Fix packet loss on Tiger Lake and later (bsc#1158533).
- ext4: avoid trim error on fs with small groups (bsc#1191271).
- fuse: annotate lock in fuse_reverse_inval_entry() (bsc#1195795).
- gve: Add RX context (bsc#1191655).
- gve: Add a jumbo-frame device option (bsc#1191655).
- gve: Add consumed counts to ethtool stats (bsc#1191655).
- gve: Add netif_set_xps_queue call (bsc#1191655).
- gve: Add optional metadata descriptor type GVE_TXD_MTD (bsc#1191655).
- gve: Add rx buffer pagecnt bias (bsc#1191655).
- gve: Allow pageflips on larger pages (bsc#1191655).
- gve: Avoid freeing NULL pointer (bsc#1191655).
- gve: Correct available tx qpl check (bsc#1191655).
- gve: Correct order of processing device options (bsc#1191655).
- gve: DQO: avoid unused variable warnings (bsc#1191655).
- gve: Do lazy cleanup in TX path (bsc#1191655).
- gve: Fix GFP flags when allocing pages (bsc#1191655).
- gve: Implement packet continuation for RX (bsc#1191655).
- gve: Implement suspend/resume/shutdown (bsc#1191655).
- gve: Move the irq db indexes out of the ntfy block struct (bsc#1191655).
- gve: Properly handle errors in gve_assign_qpl (bsc#1191655).
- gve: Recording rx queue before sending to napi (bsc#1191655).
- gve: Switch to use napi_complete_done (bsc#1191655).
- gve: Track RX buffer allocation failures (bsc#1191655).
- gve: Update gve_free_queue_page_list signature (bsc#1191655).
- gve: Use kvcalloc() instead of kvzalloc() (bsc#1191655).
- gve: fix for null pointer dereference (bsc#1191655).
- gve: fix gve_get_stats() (bsc#1191655).
- gve: fix the wrong AdminQ buffer queue index check (bsc#1191655).
- gve: fix unmatched u64_stats_update_end() (bsc#1191655).
- gve: remove memory barrier around seqno (bsc#1191655).
- gve: report 64bit tx_bytes counter from gve_handle_report_stats() (bsc#1191655).
- i40e: Fix changing previously set num_queue_pairs for PFs (bsc#1094978).
- i40e: Fix correct max_pkt_size on VF RX queue (bsc#1101816 ).
- i40e: Fix creation of first queue by omitting it if is not power of two (bsc#1101816).
- i40e: Fix display error code in dmesg (bsc#1109837 bsc#1111981 ).
- i40e: Fix for displaying message regarding NVM version (jsc#SLE-4797).
- i40e: Fix freeing of uninitialized misc IRQ vector (bsc#1101816 ).
- i40e: Fix ping is lost after configuring ADq on VF (bsc#1094978).
- i40e: Fix pre-set max number of queues for VF (bsc#1111981 ).
- i40e: Increase delay to 1 s after global EMP reset (bsc#1101816 ).
- iavf: Fix limit of total number of queues to active queues of VF (bsc#1111981).
- iavf: prevent accidental free of filter structure (bsc#1111981 ).
- ibmvnic: Allow queueing resets during probe (bsc#1196516 ltc#196391).
- ibmvnic: Update driver return codes (bsc#1196516 ltc#196391).
- ibmvnic: clear fop when retrying probe (bsc#1196516 ltc#196391).
- ibmvnic: complete init_done on transport events (bsc#1196516 ltc#196391).
- ibmvnic: define flush_reset_queue helper (bsc#1196516 ltc#196391).
- ibmvnic: free reset-work-item when flushing (bsc#1196516 ltc#196391).
- ibmvnic: init init_done_rc earlier (bsc#1196516 ltc#196391).
- ibmvnic: initialize rc before completing wait (bsc#1196516 ltc#196391).
- ibmvnic: register netdev after init of adapter (bsc#1196516 ltc#196391).
- ibmvnic: schedule failover only if vioctl fails (bsc#1196400 ltc#195815).
- ice: Delete always true check of PF pointer (bsc#1118661 ).
- ice: ignore dropped packets during init (bsc#1118661 ).
- igb: Fix removal of unicast MAC filters of VFs (bsc#1117495).
- ixgbevf: Require large buffers for build_skb on 82599VF (bsc#1101674).
- kabi: Hide changes to s390/AP structures (jsc#SLE-20809).
- lib/iov_iter: initialize 'flags' in new pipe_buffer (bsc#1196584).
- mqprio: Correct stats in mqprio_dump_class_stats() (bsc#1109837).
- net/ibmvnic: Cleanup workaround doing an EOI after partition migration (bsc#1089644 ltc#166495 ltc#165544 git-fixes).
- net: Prevent infinite while loop in skb_tx_hash() (bsc#1109837).
- net: ena: Fix error handling when calculating max IO queues number (bsc#1174852).
- net: ena: Fix undefined state when tx request id is out of bounds (bsc#1174852).
- net: marvell: mvpp2: Fix the computation of shared CPUs (bsc#1119113).
- net: phylink: avoid mvneta warning when setting pause parameters (bsc#1119113).
- net: usb: pegasus: Do not drop long Ethernet frames (git-fixes).
- nfsd: fix use-after-free due to delegation race (git-fixes).
- phylib: fix potential use-after-free (bsc#1119113).
- platform/mellanox: mlxreg-io: Fix argument base in kstrtou32() call (bsc#1112374).
- powerpc/64s: Fix debugfs_simple_attr.cocci warnings (bsc#1157038 bsc#1157923 ltc#182612 git-fixes).
- powerpc/pseries/ddw: Revert 'Extend upper limit for huge DMA window for persistent memory' (bsc#1195995 ltc#196394).
- powerpc/pseries: read the lpar name from the firmware (bsc#1187716 ltc#193451).
- powerpc: add link stack flush mitigation status in debugfs (bsc#1157038 bsc#1157923 ltc#182612 git-fixes).
- qed: Handle management FW error (git-fixes).
- qed: rdma - do not wait for resources under hw error recovery flow (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- rndis_host: support Hytera digital radios (git-fixes).
- s390/AP: support new dynamic AP bus size limit (jsc#SLE-20809).
- s390/ap: rework crypto config info and default domain code (jsc#SLE-20809).
- s390/cpumf: Support for CPU Measurement Facility CSVN 7 (bsc#1195080 LTC#196090).
- s390/cpumf: Support for CPU Measurement Sampling Facility LS bit (bsc#1195080 LTC#196090).
- s390/hypfs: include z/VM guests with access control group set (bsc#1195638 LTC#196354).
- scsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put() (git-fixes).
- scsi: lpfc: Fix pt2pt NVMe PRLI reject LOGO loop (bsc#1189126).
- scsi: lpfc: Terminate string in lpfc_debugfs_nvmeio_trc_write() (git-fixes).
- scsi: nsp_cs: Check of ioremap return value (git-fixes).
- scsi: qedf: Fix potential dereference of NULL pointer (git-fixes).
- scsi: qla2xxx: Add devids and conditionals for 28xx (bsc#1195823).
- scsi: qla2xxx: Add ql2xnvme_queues module param to configure number of NVMe queues (bsc#1195823).
- scsi: qla2xxx: Add qla2x00_async_done() for async routines (bsc#1195823).
- scsi: qla2xxx: Add retry for exec firmware (bsc#1195823).
- scsi: qla2xxx: Check for firmware dump already collected (bsc#1195823).
- scsi: qla2xxx: Fix T10 PI tag escape and IP guard options for 28XX adapters (bsc#1195823).
- scsi: qla2xxx: Fix device reconnect in loop topology (bsc#1195823).
- scsi: qla2xxx: Fix premature hw access after PCI error (bsc#1195823).
- scsi: qla2xxx: Fix scheduling while atomic (bsc#1195823).
- scsi: qla2xxx: Fix stuck session in gpdb (bsc#1195823).
- scsi: qla2xxx: Fix unmap of already freed sgl (bsc#1195823).
- scsi: qla2xxx: Fix warning for missing error code (bsc#1195823).
- scsi: qla2xxx: Fix warning message due to adisc being flushed (bsc#1195823).
- scsi: qla2xxx: Fix wrong FDMI data for 64G adapter (bsc#1195823).
- scsi: qla2xxx: Implement ref count for SRB (bsc#1195823).
- scsi: qla2xxx: Refactor asynchronous command initialization (bsc#1195823).
- scsi: qla2xxx: Remove a declaration (bsc#1195823).
- scsi: qla2xxx: Remove unused qla_sess_op_cmd_list from scsi_qla_host_t (bsc#1195823).
- scsi: qla2xxx: Return -ENOMEM if kzalloc() fails (bsc#1195823).
- scsi: qla2xxx: Suppress a kernel complaint in qla_create_qpair() (bsc#1195823).
- scsi: qla2xxx: Update version to 10.02.07.200-k (bsc#1195823).
- scsi: qla2xxx: Update version to 10.02.07.300-k (bsc#1195823).
- scsi: qla2xxx: edif: Fix clang warning (bsc#1195823).
- scsi: qla2xxx: edif: Fix inconsistent check of db_flags (bsc#1195823).
- scsi: qla2xxx: edif: Reduce connection thrash (bsc#1195823).
- scsi: qla2xxx: edif: Replace list_for_each_safe with list_for_each_entry_safe (bsc#1195823).
- scsi: qla2xxx: edif: Tweak trace message (bsc#1195823).
- scsi: scsi_debug: Sanity check block descriptor length in resp_mode_select() (git-fixes).
- scsi: ufs: Fix race conditions related to driver data (git-fixes).
- scsi: zfcp: Fix failed recovery on gone remote port with non-NPIV FCP devices (bsc#1195377 LTC#196245).
- sunrpc/auth_gss: support timeout on gss upcalls (bsc#1193857).
- tracing: Dump stacktrace trigger to the corresponding instance (git-fixes).
- tracing: Have traceon and traceoff trigger honor the instance (git-fixes).
- usb: common: ulpi: Fix crash in ulpi_match() (git-fixes).
- usb: typec: tcpm: Do not disconnect while receiving VBUS off (git-fixes).
Patchnames
SUSE-2022-761,SUSE-SLE-RT-12-SP5-2022-761
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 12 SP5 RT kernel was updated to receive various security and bugfixes.\n\n\n- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).\n- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).\n- CVE-2022-0847: Fixed a vulnerability were a local attackers could overwrite data in arbitrary (read-only) files (bsc#1196584).\n- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)\n- CVE-2022-0644: Fixed a denial of service by a local user. A assertion failure could be triggered in kernel_read_file_from_fd() (bsc#1196155).\n- CVE-2021-44879: In gc_data_segment() in fs/f2fs/gc.c, special files were not considered, which lead to a move_data_page NULL pointer dereference (bsc#1195987).\n- CVE-2022-24959: Fixed a memory leak in yam_siocdevprivate() in drivers/net/hamradio/yam.c (bsc#1195897).\n- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).\n\nThe following non-security bugs were fixed:\n\n- Bluetooth: bfusb: fix division by zero in send path (git-fixes).\n- EDAC/xgene: Fix deferred probing (bsc#1114648).\n- IB/rdmavt: Validate remote_addr during loopback atomic tests (bsc#1114685).\n- NFSv4.x: by default serialize open/close operations (bsc#1114893 bsc#1195934). Make this work-around optional\n- NFSv42: Do not fail clone() unless the OP_CLONE operation failed (git-fixes).\n- NFSv42: Fix pagecache invalidation after COPY/CLONE (git-fixes).\n- NFSv4: Handle case where the lookup of a directory fails (git-fixes).\n- NFSv4: nfs_atomic_open() can race when looking up a non-regular file (git-fixes).\n- PCI: Add function 1 DMA alias quirk for Marvell 88SE9125 SATA controller (git-fixes).\n- RDMA/bnxt_re: Fix query SRQ failure (bsc#1050244).\n- RDMA/mlx5: Set user priority for DCT (bsc#1103991).\n- RDMA/netlink: Add __maybe_unused to static inline in C file (bsc#1046306).\n- crypto: af_alg - get_page upon reassignment to TX SGL (bsc#1195840).\n- cxgb4: fix eeprom len when diagnostics not implemented (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- e1000e: Fix packet loss on Tiger Lake and later (bsc#1158533).\n- ext4: avoid trim error on fs with small groups (bsc#1191271).\n- fuse: annotate lock in fuse_reverse_inval_entry() (bsc#1195795).\n- gve: Add RX context (bsc#1191655).\n- gve: Add a jumbo-frame device option (bsc#1191655).\n- gve: Add consumed counts to ethtool stats (bsc#1191655).\n- gve: Add netif_set_xps_queue call (bsc#1191655).\n- gve: Add optional metadata descriptor type GVE_TXD_MTD (bsc#1191655).\n- gve: Add rx buffer pagecnt bias (bsc#1191655).\n- gve: Allow pageflips on larger pages (bsc#1191655).\n- gve: Avoid freeing NULL pointer (bsc#1191655).\n- gve: Correct available tx qpl check (bsc#1191655).\n- gve: Correct order of processing device options (bsc#1191655).\n- gve: DQO: avoid unused variable warnings (bsc#1191655).\n- gve: Do lazy cleanup in TX path (bsc#1191655).\n- gve: Fix GFP flags when allocing pages (bsc#1191655).\n- gve: Implement packet continuation for RX (bsc#1191655).\n- gve: Implement suspend/resume/shutdown (bsc#1191655).\n- gve: Move the irq db indexes out of the ntfy block struct (bsc#1191655).\n- gve: Properly handle errors in gve_assign_qpl (bsc#1191655).\n- gve: Recording rx queue before sending to napi (bsc#1191655).\n- gve: Switch to use napi_complete_done (bsc#1191655).\n- gve: Track RX buffer allocation failures (bsc#1191655).\n- gve: Update gve_free_queue_page_list signature (bsc#1191655).\n- gve: Use kvcalloc() instead of kvzalloc() (bsc#1191655).\n- gve: fix for null pointer dereference (bsc#1191655).\n- gve: fix gve_get_stats() (bsc#1191655).\n- gve: fix the wrong AdminQ buffer queue index check (bsc#1191655).\n- gve: fix unmatched u64_stats_update_end() (bsc#1191655).\n- gve: remove memory barrier around seqno (bsc#1191655).\n- gve: report 64bit tx_bytes counter from gve_handle_report_stats() (bsc#1191655).\n- i40e: Fix changing previously set num_queue_pairs for PFs (bsc#1094978).\n- i40e: Fix correct max_pkt_size on VF RX queue (bsc#1101816 ).\n- i40e: Fix creation of first queue by omitting it if is not power of two (bsc#1101816).\n- i40e: Fix display error code in dmesg (bsc#1109837 bsc#1111981 ).\n- i40e: Fix for displaying message regarding NVM version (jsc#SLE-4797).\n- i40e: Fix freeing of uninitialized misc IRQ vector (bsc#1101816 ).\n- i40e: Fix ping is lost after configuring ADq on VF (bsc#1094978).\n- i40e: Fix pre-set max number of queues for VF (bsc#1111981 ).\n- i40e: Increase delay to 1 s after global EMP reset (bsc#1101816 ).\n- iavf: Fix limit of total number of queues to active queues of VF (bsc#1111981).\n- iavf: prevent accidental free of filter structure (bsc#1111981 ).\n- ibmvnic: Allow queueing resets during probe (bsc#1196516 ltc#196391).\n- ibmvnic: Update driver return codes (bsc#1196516 ltc#196391).\n- ibmvnic: clear fop when retrying probe (bsc#1196516 ltc#196391).\n- ibmvnic: complete init_done on transport events (bsc#1196516 ltc#196391).\n- ibmvnic: define flush_reset_queue helper (bsc#1196516 ltc#196391).\n- ibmvnic: free reset-work-item when flushing (bsc#1196516 ltc#196391).\n- ibmvnic: init init_done_rc earlier (bsc#1196516 ltc#196391).\n- ibmvnic: initialize rc before completing wait (bsc#1196516 ltc#196391).\n- ibmvnic: register netdev after init of adapter (bsc#1196516 ltc#196391).\n- ibmvnic: schedule failover only if vioctl fails (bsc#1196400 ltc#195815).\n- ice: Delete always true check of PF pointer (bsc#1118661 ).\n- ice: ignore dropped packets during init (bsc#1118661 ).\n- igb: Fix removal of unicast MAC filters of VFs (bsc#1117495).\n- ixgbevf: Require large buffers for build_skb on 82599VF (bsc#1101674).\n- kabi: Hide changes to s390/AP structures (jsc#SLE-20809).\n- lib/iov_iter: initialize \u0027flags\u0027 in new pipe_buffer (bsc#1196584).\n- mqprio: Correct stats in mqprio_dump_class_stats() (bsc#1109837).\n- net/ibmvnic: Cleanup workaround doing an EOI after partition migration (bsc#1089644 ltc#166495 ltc#165544 git-fixes).\n- net: Prevent infinite while loop in skb_tx_hash() (bsc#1109837).\n- net: ena: Fix error handling when calculating max IO queues number (bsc#1174852).\n- net: ena: Fix undefined state when tx request id is out of bounds (bsc#1174852).\n- net: marvell: mvpp2: Fix the computation of shared CPUs (bsc#1119113).\n- net: phylink: avoid mvneta warning when setting pause parameters (bsc#1119113).\n- net: usb: pegasus: Do not drop long Ethernet frames (git-fixes).\n- nfsd: fix use-after-free due to delegation race (git-fixes).\n- phylib: fix potential use-after-free (bsc#1119113).\n- platform/mellanox: mlxreg-io: Fix argument base in kstrtou32() call (bsc#1112374).\n- powerpc/64s: Fix debugfs_simple_attr.cocci warnings (bsc#1157038 bsc#1157923 ltc#182612 git-fixes).\n- powerpc/pseries/ddw: Revert \u0027Extend upper limit for huge DMA window for persistent memory\u0027 (bsc#1195995 ltc#196394).\n- powerpc/pseries: read the lpar name from the firmware (bsc#1187716 ltc#193451).\n- powerpc: add link stack flush mitigation status in debugfs (bsc#1157038 bsc#1157923 ltc#182612 git-fixes).\n- qed: Handle management FW error (git-fixes).\n- qed: rdma - do not wait for resources under hw error recovery flow (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- rndis_host: support Hytera digital radios (git-fixes).\n- s390/AP: support new dynamic AP bus size limit (jsc#SLE-20809).\n- s390/ap: rework crypto config info and default domain code (jsc#SLE-20809).\n- s390/cpumf: Support for CPU Measurement Facility CSVN 7 (bsc#1195080 LTC#196090).\n- s390/cpumf: Support for CPU Measurement Sampling Facility LS bit (bsc#1195080 LTC#196090).\n- s390/hypfs: include z/VM guests with access control group set (bsc#1195638 LTC#196354).\n- scsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put() (git-fixes).\n- scsi: lpfc: Fix pt2pt NVMe PRLI reject LOGO loop (bsc#1189126).\n- scsi: lpfc: Terminate string in lpfc_debugfs_nvmeio_trc_write() (git-fixes).\n- scsi: nsp_cs: Check of ioremap return value (git-fixes).\n- scsi: qedf: Fix potential dereference of NULL pointer (git-fixes).\n- scsi: qla2xxx: Add devids and conditionals for 28xx (bsc#1195823).\n- scsi: qla2xxx: Add ql2xnvme_queues module param to configure number of NVMe queues (bsc#1195823).\n- scsi: qla2xxx: Add qla2x00_async_done() for async routines (bsc#1195823).\n- scsi: qla2xxx: Add retry for exec firmware (bsc#1195823).\n- scsi: qla2xxx: Check for firmware dump already collected (bsc#1195823).\n- scsi: qla2xxx: Fix T10 PI tag escape and IP guard options for 28XX adapters (bsc#1195823).\n- scsi: qla2xxx: Fix device reconnect in loop topology (bsc#1195823).\n- scsi: qla2xxx: Fix premature hw access after PCI error (bsc#1195823).\n- scsi: qla2xxx: Fix scheduling while atomic (bsc#1195823).\n- scsi: qla2xxx: Fix stuck session in gpdb (bsc#1195823).\n- scsi: qla2xxx: Fix unmap of already freed sgl (bsc#1195823).\n- scsi: qla2xxx: Fix warning for missing error code (bsc#1195823).\n- scsi: qla2xxx: Fix warning message due to adisc being flushed (bsc#1195823).\n- scsi: qla2xxx: Fix wrong FDMI data for 64G adapter (bsc#1195823).\n- scsi: qla2xxx: Implement ref count for SRB (bsc#1195823).\n- scsi: qla2xxx: Refactor asynchronous command initialization (bsc#1195823).\n- scsi: qla2xxx: Remove a declaration (bsc#1195823).\n- scsi: qla2xxx: Remove unused qla_sess_op_cmd_list from scsi_qla_host_t (bsc#1195823).\n- scsi: qla2xxx: Return -ENOMEM if kzalloc() fails (bsc#1195823).\n- scsi: qla2xxx: Suppress a kernel complaint in qla_create_qpair() (bsc#1195823).\n- scsi: qla2xxx: Update version to 10.02.07.200-k (bsc#1195823).\n- scsi: qla2xxx: Update version to 10.02.07.300-k (bsc#1195823).\n- scsi: qla2xxx: edif: Fix clang warning (bsc#1195823).\n- scsi: qla2xxx: edif: Fix inconsistent check of db_flags (bsc#1195823).\n- scsi: qla2xxx: edif: Reduce connection thrash (bsc#1195823).\n- scsi: qla2xxx: edif: Replace list_for_each_safe with list_for_each_entry_safe (bsc#1195823).\n- scsi: qla2xxx: edif: Tweak trace message (bsc#1195823).\n- scsi: scsi_debug: Sanity check block descriptor length in resp_mode_select() (git-fixes).\n- scsi: ufs: Fix race conditions related to driver data (git-fixes).\n- scsi: zfcp: Fix failed recovery on gone remote port with non-NPIV FCP devices (bsc#1195377 LTC#196245).\n- sunrpc/auth_gss: support timeout on gss upcalls (bsc#1193857).\n- tracing: Dump stacktrace trigger to the corresponding instance (git-fixes).\n- tracing: Have traceon and traceoff trigger honor the instance (git-fixes).\n- usb: common: ulpi: Fix crash in ulpi_match() (git-fixes).\n- usb: typec: tcpm: Do not disconnect while receiving VBUS off (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-761,SUSE-SLE-RT-12-SP5-2022-761", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0761-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:0761-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220761-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:0761-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010398.html" }, { "category": "self", "summary": "SUSE Bug 1046306", "url": "https://bugzilla.suse.com/1046306" }, { "category": "self", "summary": "SUSE Bug 1050244", "url": "https://bugzilla.suse.com/1050244" }, { "category": "self", "summary": "SUSE Bug 1089644", "url": "https://bugzilla.suse.com/1089644" }, { "category": "self", "summary": "SUSE Bug 1094978", "url": "https://bugzilla.suse.com/1094978" }, { "category": "self", "summary": "SUSE Bug 1097583", "url": "https://bugzilla.suse.com/1097583" }, { "category": "self", "summary": "SUSE Bug 1097584", "url": "https://bugzilla.suse.com/1097584" }, { "category": "self", "summary": "SUSE Bug 1097585", "url": "https://bugzilla.suse.com/1097585" }, { "category": "self", "summary": "SUSE Bug 1097586", "url": "https://bugzilla.suse.com/1097586" }, { "category": "self", "summary": "SUSE Bug 1097587", "url": "https://bugzilla.suse.com/1097587" }, { "category": "self", "summary": "SUSE Bug 1097588", "url": "https://bugzilla.suse.com/1097588" }, { "category": "self", "summary": "SUSE Bug 1101674", "url": "https://bugzilla.suse.com/1101674" }, { "category": "self", "summary": "SUSE Bug 1101816", "url": "https://bugzilla.suse.com/1101816" }, { "category": "self", "summary": "SUSE Bug 1103991", "url": "https://bugzilla.suse.com/1103991" }, { "category": "self", "summary": "SUSE Bug 1109837", "url": "https://bugzilla.suse.com/1109837" }, { "category": "self", "summary": "SUSE Bug 1111981", "url": "https://bugzilla.suse.com/1111981" }, { "category": "self", "summary": "SUSE Bug 1112374", "url": "https://bugzilla.suse.com/1112374" }, { "category": "self", "summary": "SUSE Bug 1114648", "url": "https://bugzilla.suse.com/1114648" }, { "category": "self", "summary": "SUSE Bug 1114685", "url": "https://bugzilla.suse.com/1114685" }, { "category": "self", "summary": "SUSE Bug 1114893", "url": "https://bugzilla.suse.com/1114893" }, { "category": "self", "summary": "SUSE Bug 1117495", "url": "https://bugzilla.suse.com/1117495" }, { "category": "self", "summary": "SUSE Bug 1118661", "url": "https://bugzilla.suse.com/1118661" }, { "category": "self", "summary": "SUSE Bug 1119113", "url": "https://bugzilla.suse.com/1119113" }, { "category": "self", "summary": "SUSE Bug 1136460", "url": "https://bugzilla.suse.com/1136460" }, { "category": "self", "summary": "SUSE Bug 1136461", "url": "https://bugzilla.suse.com/1136461" }, { "category": "self", "summary": "SUSE Bug 1157038", "url": "https://bugzilla.suse.com/1157038" }, { "category": "self", "summary": "SUSE Bug 1157923", "url": "https://bugzilla.suse.com/1157923" }, { "category": "self", "summary": "SUSE Bug 1158533", "url": "https://bugzilla.suse.com/1158533" }, { "category": "self", "summary": "SUSE Bug 1174852", "url": "https://bugzilla.suse.com/1174852" }, { "category": "self", "summary": "SUSE Bug 1185973", "url": "https://bugzilla.suse.com/1185973" }, { "category": "self", "summary": "SUSE Bug 1187716", "url": "https://bugzilla.suse.com/1187716" }, { "category": "self", "summary": "SUSE Bug 1189126", "url": "https://bugzilla.suse.com/1189126" }, { "category": "self", "summary": "SUSE Bug 1191271", "url": "https://bugzilla.suse.com/1191271" }, { "category": "self", "summary": "SUSE Bug 1191580", "url": "https://bugzilla.suse.com/1191580" }, { "category": "self", "summary": "SUSE Bug 1191655", "url": "https://bugzilla.suse.com/1191655" }, { "category": "self", "summary": "SUSE Bug 1193857", "url": "https://bugzilla.suse.com/1193857" }, { "category": "self", "summary": "SUSE Bug 1195080", "url": "https://bugzilla.suse.com/1195080" }, { "category": "self", "summary": "SUSE Bug 1195377", "url": "https://bugzilla.suse.com/1195377" }, { "category": "self", "summary": "SUSE Bug 1195536", "url": "https://bugzilla.suse.com/1195536" }, { "category": "self", "summary": "SUSE Bug 1195543", "url": "https://bugzilla.suse.com/1195543" }, { "category": "self", "summary": "SUSE Bug 1195638", "url": "https://bugzilla.suse.com/1195638" }, { "category": "self", "summary": "SUSE Bug 1195795", "url": "https://bugzilla.suse.com/1195795" }, { "category": "self", "summary": "SUSE Bug 1195823", "url": "https://bugzilla.suse.com/1195823" }, { "category": "self", "summary": "SUSE Bug 1195840", "url": "https://bugzilla.suse.com/1195840" }, { "category": "self", "summary": "SUSE Bug 1195897", "url": "https://bugzilla.suse.com/1195897" }, { "category": "self", "summary": "SUSE Bug 1195908", "url": "https://bugzilla.suse.com/1195908" }, { "category": "self", "summary": "SUSE Bug 1195934", "url": "https://bugzilla.suse.com/1195934" }, { "category": "self", "summary": "SUSE Bug 1195987", "url": "https://bugzilla.suse.com/1195987" }, { "category": "self", "summary": "SUSE Bug 1195995", "url": "https://bugzilla.suse.com/1195995" }, { "category": "self", "summary": "SUSE Bug 1196079", "url": "https://bugzilla.suse.com/1196079" }, { "category": "self", "summary": "SUSE Bug 1196155", "url": "https://bugzilla.suse.com/1196155" }, { "category": "self", "summary": "SUSE Bug 1196400", "url": "https://bugzilla.suse.com/1196400" }, { "category": "self", "summary": "SUSE Bug 1196516", "url": "https://bugzilla.suse.com/1196516" }, { "category": "self", "summary": "SUSE Bug 1196584", "url": "https://bugzilla.suse.com/1196584" }, { "category": "self", "summary": "SUSE Bug 1196612", "url": "https://bugzilla.suse.com/1196612" }, { "category": "self", "summary": "SUSE CVE CVE-2021-44879 page", "url": "https://www.suse.com/security/cve/CVE-2021-44879/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0001 page", "url": "https://www.suse.com/security/cve/CVE-2022-0001/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0002 page", "url": "https://www.suse.com/security/cve/CVE-2022-0002/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0492 page", "url": "https://www.suse.com/security/cve/CVE-2022-0492/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0617 page", "url": "https://www.suse.com/security/cve/CVE-2022-0617/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0644 page", "url": "https://www.suse.com/security/cve/CVE-2022-0644/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0847 page", "url": "https://www.suse.com/security/cve/CVE-2022-0847/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-24959 page", "url": "https://www.suse.com/security/cve/CVE-2022-24959/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2022-03-09T13:27:14Z", "generator": { "date": "2022-03-09T13:27:14Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:0761-1", "initial_release_date": "2022-03-09T13:27:14Z", "revision_history": [ { "date": "2022-03-09T13:27:14Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-rt-4.12.14-10.81.1.noarch", "product": { "name": "kernel-devel-rt-4.12.14-10.81.1.noarch", "product_id": "kernel-devel-rt-4.12.14-10.81.1.noarch" } }, { "category": "product_version", "name": "kernel-source-rt-4.12.14-10.81.1.noarch", "product": { "name": "kernel-source-rt-4.12.14-10.81.1.noarch", "product_id": "kernel-source-rt-4.12.14-10.81.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-rt-4.12.14-10.81.1.x86_64", "product": { "name": "cluster-md-kmp-rt-4.12.14-10.81.1.x86_64", "product_id": "cluster-md-kmp-rt-4.12.14-10.81.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-rt_debug-4.12.14-10.81.1.x86_64", "product": { "name": "cluster-md-kmp-rt_debug-4.12.14-10.81.1.x86_64", "product_id": "cluster-md-kmp-rt_debug-4.12.14-10.81.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt-4.12.14-10.81.1.x86_64", "product": { "name": "dlm-kmp-rt-4.12.14-10.81.1.x86_64", "product_id": "dlm-kmp-rt-4.12.14-10.81.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt_debug-4.12.14-10.81.1.x86_64", "product": { "name": "dlm-kmp-rt_debug-4.12.14-10.81.1.x86_64", "product_id": "dlm-kmp-rt_debug-4.12.14-10.81.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt-4.12.14-10.81.1.x86_64", "product": { "name": "gfs2-kmp-rt-4.12.14-10.81.1.x86_64", "product_id": "gfs2-kmp-rt-4.12.14-10.81.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt_debug-4.12.14-10.81.1.x86_64", "product": { "name": "gfs2-kmp-rt_debug-4.12.14-10.81.1.x86_64", "product_id": "gfs2-kmp-rt_debug-4.12.14-10.81.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-4.12.14-10.81.1.x86_64", "product": { "name": "kernel-rt-4.12.14-10.81.1.x86_64", "product_id": "kernel-rt-4.12.14-10.81.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-base-4.12.14-10.81.1.x86_64", "product": { "name": "kernel-rt-base-4.12.14-10.81.1.x86_64", "product_id": "kernel-rt-base-4.12.14-10.81.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-4.12.14-10.81.1.x86_64", "product": { "name": "kernel-rt-devel-4.12.14-10.81.1.x86_64", "product_id": "kernel-rt-devel-4.12.14-10.81.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-extra-4.12.14-10.81.1.x86_64", "product": { "name": "kernel-rt-extra-4.12.14-10.81.1.x86_64", "product_id": "kernel-rt-extra-4.12.14-10.81.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-kgraft-devel-4.12.14-10.81.1.x86_64", "product": { "name": "kernel-rt-kgraft-devel-4.12.14-10.81.1.x86_64", "product_id": "kernel-rt-kgraft-devel-4.12.14-10.81.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-4.12.14-10.81.1.x86_64", "product": { "name": "kernel-rt_debug-4.12.14-10.81.1.x86_64", "product_id": "kernel-rt_debug-4.12.14-10.81.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-base-4.12.14-10.81.1.x86_64", "product": { "name": "kernel-rt_debug-base-4.12.14-10.81.1.x86_64", "product_id": "kernel-rt_debug-base-4.12.14-10.81.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-devel-4.12.14-10.81.1.x86_64", "product": { "name": "kernel-rt_debug-devel-4.12.14-10.81.1.x86_64", "product_id": "kernel-rt_debug-devel-4.12.14-10.81.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-extra-4.12.14-10.81.1.x86_64", "product": { "name": "kernel-rt_debug-extra-4.12.14-10.81.1.x86_64", "product_id": "kernel-rt_debug-extra-4.12.14-10.81.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-kgraft-devel-4.12.14-10.81.1.x86_64", "product": { "name": "kernel-rt_debug-kgraft-devel-4.12.14-10.81.1.x86_64", "product_id": "kernel-rt_debug-kgraft-devel-4.12.14-10.81.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-4.12.14-10.81.1.x86_64", "product": { "name": "kernel-syms-rt-4.12.14-10.81.1.x86_64", "product_id": "kernel-syms-rt-4.12.14-10.81.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-rt-4.12.14-10.81.1.x86_64", "product": { "name": "kselftests-kmp-rt-4.12.14-10.81.1.x86_64", "product_id": "kselftests-kmp-rt-4.12.14-10.81.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-rt_debug-4.12.14-10.81.1.x86_64", "product": { "name": "kselftests-kmp-rt_debug-4.12.14-10.81.1.x86_64", "product_id": "kselftests-kmp-rt_debug-4.12.14-10.81.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt-4.12.14-10.81.1.x86_64", "product": { "name": "ocfs2-kmp-rt-4.12.14-10.81.1.x86_64", "product_id": "ocfs2-kmp-rt-4.12.14-10.81.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt_debug-4.12.14-10.81.1.x86_64", "product": { "name": "ocfs2-kmp-rt_debug-4.12.14-10.81.1.x86_64", "product_id": "ocfs2-kmp-rt_debug-4.12.14-10.81.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Real Time 12 SP5", "product": { "name": "SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-linux-enterprise-rt:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-rt-4.12.14-10.81.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.81.1.x86_64" }, "product_reference": "cluster-md-kmp-rt-4.12.14-10.81.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-rt-4.12.14-10.81.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.81.1.x86_64" }, "product_reference": "dlm-kmp-rt-4.12.14-10.81.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-rt-4.12.14-10.81.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.81.1.x86_64" }, "product_reference": "gfs2-kmp-rt-4.12.14-10.81.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-rt-4.12.14-10.81.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.81.1.noarch" }, "product_reference": "kernel-devel-rt-4.12.14-10.81.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-4.12.14-10.81.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.81.1.x86_64" }, "product_reference": "kernel-rt-4.12.14-10.81.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-base-4.12.14-10.81.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.81.1.x86_64" }, "product_reference": "kernel-rt-base-4.12.14-10.81.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-4.12.14-10.81.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.81.1.x86_64" }, "product_reference": "kernel-rt-devel-4.12.14-10.81.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-4.12.14-10.81.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.81.1.x86_64" }, "product_reference": "kernel-rt_debug-4.12.14-10.81.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-devel-4.12.14-10.81.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.81.1.x86_64" }, "product_reference": "kernel-rt_debug-devel-4.12.14-10.81.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-4.12.14-10.81.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.81.1.noarch" }, "product_reference": "kernel-source-rt-4.12.14-10.81.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-4.12.14-10.81.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.81.1.x86_64" }, "product_reference": "kernel-syms-rt-4.12.14-10.81.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-rt-4.12.14-10.81.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.81.1.x86_64" }, "product_reference": "ocfs2-kmp-rt-4.12.14-10.81.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-44879", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-44879" } ], "notes": [ { "category": "general", "text": "In gc_data_segment in fs/f2fs/gc.c in the Linux kernel before 5.16.3, special files are not considered, leading to a move_data_page NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.81.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-44879", "url": "https://www.suse.com/security/cve/CVE-2021-44879" }, { "category": "external", "summary": "SUSE Bug 1195987 for CVE-2021-44879", "url": "https://bugzilla.suse.com/1195987" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.81.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.81.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T13:27:14Z", "details": "moderate" } ], "title": "CVE-2021-44879" }, { "cve": "CVE-2022-0001", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0001" } ], "notes": [ { "category": "general", "text": "Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.81.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0001", "url": "https://www.suse.com/security/cve/CVE-2022-0001" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2022-0001", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2022-0001", "url": "https://bugzilla.suse.com/1196901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.81.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.81.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T13:27:14Z", "details": "moderate" } ], "title": "CVE-2022-0001" }, { "cve": "CVE-2022-0002", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0002" } ], "notes": [ { "category": "general", "text": "Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.81.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0002", "url": "https://www.suse.com/security/cve/CVE-2022-0002" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2022-0002", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2022-0002", "url": "https://bugzilla.suse.com/1196901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.81.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.81.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T13:27:14Z", "details": "moderate" } ], "title": "CVE-2022-0002" }, { "cve": "CVE-2022-0492", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0492" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in the Linux kernel\u0027s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.81.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0492", "url": "https://www.suse.com/security/cve/CVE-2022-0492" }, { "category": "external", "summary": "SUSE Bug 1195543 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1195543" }, { "category": "external", "summary": "SUSE Bug 1195908 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1195908" }, { "category": "external", "summary": "SUSE Bug 1196612 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1196612" }, { "category": "external", "summary": "SUSE Bug 1196776 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1196776" }, { "category": "external", "summary": "SUSE Bug 1198615 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1198615" }, { "category": "external", "summary": "SUSE Bug 1199255 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1199255" }, { "category": "external", "summary": "SUSE Bug 1199615 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1199615" }, { "category": "external", "summary": "SUSE Bug 1200084 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1200084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.81.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.81.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T13:27:14Z", "details": "moderate" } ], "title": "CVE-2022-0492" }, { "cve": "CVE-2022-0617", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0617" } ], "notes": [ { "category": "general", "text": "A flaw null pointer dereference in the Linux kernel UDF file system functionality was found in the way user triggers udf_file_write_iter function for the malicious UDF image. A local user could use this flaw to crash the system. Actual from Linux kernel 4.2-rc1 till 5.17-rc2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.81.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0617", "url": "https://www.suse.com/security/cve/CVE-2022-0617" }, { "category": "external", "summary": "SUSE Bug 1196079 for CVE-2022-0617", "url": "https://bugzilla.suse.com/1196079" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.81.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.81.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T13:27:14Z", "details": "moderate" } ], "title": "CVE-2022-0617" }, { "cve": "CVE-2022-0644", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0644" } ], "notes": [ { "category": "general", "text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.81.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0644", "url": "https://www.suse.com/security/cve/CVE-2022-0644" }, { "category": "external", "summary": "SUSE Bug 1196155 for CVE-2022-0644", "url": "https://bugzilla.suse.com/1196155" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.81.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.81.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T13:27:14Z", "details": "moderate" } ], "title": "CVE-2022-0644" }, { "cve": "CVE-2022-0847", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0847" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way the \"flags\" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.81.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0847", "url": "https://www.suse.com/security/cve/CVE-2022-0847" }, { "category": "external", "summary": "SUSE Bug 1196584 for CVE-2022-0847", "url": "https://bugzilla.suse.com/1196584" }, { "category": "external", "summary": "SUSE Bug 1196601 for CVE-2022-0847", "url": "https://bugzilla.suse.com/1196601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.81.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.81.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T13:27:14Z", "details": "important" } ], "title": "CVE-2022-0847" }, { "cve": "CVE-2022-24959", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-24959" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.16.5. There is a memory leak in yam_siocdevprivate in drivers/net/hamradio/yam.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.81.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-24959", "url": "https://www.suse.com/security/cve/CVE-2022-24959" }, { "category": "external", "summary": "SUSE Bug 1195897 for CVE-2022-24959", "url": "https://bugzilla.suse.com/1195897" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.81.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.81.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.81.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.81.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T13:27:14Z", "details": "moderate" } ], "title": "CVE-2022-24959" } ] }
suse-su-2022:0763-1
Vulnerability from csaf_suse
Published
2022-03-09 13:37
Modified
2022-03-09 13:37
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP3 RT kernel was updated to receive various security and bugfixes.
Transient execution side-channel attacks attacking the Branch History Buffer (BHB),
named 'Branch Target Injection' and 'Intra-Mode Branch History Injection' are now mitigated.
The following security bugs were fixed:
- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).
- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).
- CVE-2022-0847: Fixed a vulnerability were a local attackers could overwrite data in arbitrary (read-only) files (bsc#1196584).
- CVE-2022-25375: The RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command. Attackers can obtain sensitive information from kernel memory (bnc#1196235 ).
The following non-security bugs were fixed:
- ACPI/IORT: Check node revision for PMCG resources (git-fixes).
- ALSA: hda/realtek: Add missing fixup-model entry for Gigabyte X570 ALC1220 quirks (git-fixes).
- ALSA: hda/realtek: Add quirk for ASUS GU603 (git-fixes).
- ALSA: hda/realtek: Fix silent output on Gigabyte X570 Aorus Xtreme after reboot from Windows (git-fixes).
- ALSA: hda/realtek: Fix silent output on Gigabyte X570S Aorus Master (newer chipset) (git-fixes).
- ALSA: hda: Fix missing codec probe on Shenker Dock 15 (git-fixes).
- ALSA: hda: Fix regression on forced probe mask option (git-fixes).
- ASoC: Revert 'ASoC: mediatek: Check for error clk pointer' (git-fixes).
- ASoC: ops: Fix stereo change notifications in snd_soc_put_volsw() (git-fixes).
- ASoC: ops: Fix stereo change notifications in snd_soc_put_volsw_range() (git-fixes).
- ASoC: ops: Reject out of bounds values in snd_soc_put_volsw() (git-fixes).
- ASoC: ops: Reject out of bounds values in snd_soc_put_volsw_sx() (git-fixes).
- ASoC: ops: Reject out of bounds values in snd_soc_put_xr_sx() (git-fixes).
- Align s390 NVME target options with other architectures (bsc#1188404, jsc#SLE-22494). CONFIG_NVME_TARGET=m CONFIG_NVME_TARGET_PASSTHRU=y CONFIG_NVME_TARGET_LOOP=m CONFIG_NVME_TARGET_RDMA=m CONFIG_NVME_TARGET_FC=m CONFIG_NVME_TARGET_FCLOOP=m CONFIG_NVME_TARGET_TCP=m
- EDAC/xgene: Fix deferred probing (bsc#1178134).
- HID:Add support for UGTABLET WP5540 (git-fixes).
- IB/cma: Do not send IGMP leaves for sendonly Multicast groups (git-fixes).
- IB/hfi1: Fix AIP early init panic (jsc#SLE-13208).
- KVM: remember position in kvm->vcpus array (bsc#1190972 LTC#194674).
- NFSD: Fix the behavior of READ near OFFSET_MAX (bsc#1195957).
- PM: hibernate: Remove register_nosave_region_late() (git-fixes).
- PM: s2idle: ACPI: Fix wakeup interrupts handling (git-fixes).
- RDMA/cma: Use correct address when leaving multicast group (bsc#1181147).
- RDMA/ucma: Protect mc during concurrent multicast leaves (bsc#1181147).
- USB: serial: ch341: add support for GW Instek USB2.0-Serial devices (git-fixes).
- USB: serial: cp210x: add CPI Bulk Coin Recycler id (git-fixes).
- USB: serial: cp210x: add NCR Retail IO box id (git-fixes).
- USB: serial: ftdi_sio: add support for Brainboxes US-159/235/320 (git-fixes).
- USB: serial: mos7840: remove duplicated 0xac24 device ID (git-fixes).
- USB: serial: option: add ZTE MF286D modem (git-fixes).
- ata: libata-core: Disable TRIM on M88V29 (git-fixes).
- ax25: improve the incomplete fix to avoid UAF and NPD bugs (git-fixes).
- blk-mq: always allow reserved allocation in hctx_may_queue (bsc#1193787).
- blk-mq: avoid to iterate over stale request (bsc#1193787).
- blk-mq: clear stale request in tags->rq before freeing one request pool (bsc#1193787).
- blk-mq: clearing flush request reference in tags->rqs (bsc#1193787).
- blk-mq: do not grab rq's refcount in blk_mq_check_expired() (bsc#1193787 git-fixes).
- blk-mq: fix is_flush_rq (bsc#1193787 git-fixes).
- blk-mq: fix kernel panic during iterating over flush request (bsc#1193787 git-fixes).
- blk-mq: grab rq->refcount before calling ->fn in blk_mq_tagset_busy_iter (bsc#1193787).
- blk-mq: mark flush request as IDLE in flush_end_io() (bsc#1193787).
- blk-tag: Hide spin_lock (bsc#1193787).
- block: avoid double io accounting for flush request (bsc#1193787).
- block: do not send a rezise udev event for hidden block device (bsc#1193096).
- block: mark flush request as IDLE when it is really finished (bsc#1193787).
- bonding: pair enable_port with slave_arr_updates (git-fixes).
- btrfs: check for missing device in btrfs_trim_fs (bsc#1195701).
- btrfs: check worker before need_preemptive_reclaim (bsc#1196195).
- btrfs: do not do preemptive flushing if the majority is global rsv (bsc#1196195).
- btrfs: do not include the global rsv size in the preemptive used amount (bsc#1196195).
- btrfs: handle preemptive delalloc flushing slightly differently (bsc#1196195).
- btrfs: make sure SB_I_VERSION does not get unset by remount (bsc#1192210).
- btrfs: only clamp the first time we have to start flushing (bsc#1196195).
- btrfs: only ignore delalloc if delalloc is much smaller than ordered (bsc#1196195).
- btrfs: reduce the preemptive flushing threshold to 90% (bsc#1196195).
- btrfs: take into account global rsv in need_preemptive_reclaim (bsc#1196195).
- btrfs: use the global rsv size in the preemptive thresh calculation (bsc#1196195).
- ceph: properly put ceph_string reference after async create attempt (bsc#1195798).
- ceph: set pool_ns in new inode layout for async creates (bsc#1195799).
- drm/amdgpu: fix logic inversion in check (git-fixes).
- drm/i915/gvt: Make DRM_I915_GVT depend on X86 (git-fixes).
- drm/i915/gvt: clean up kernel-doc in gtt.c (git-fixes).
- drm/i915/opregion: check port number bounds for SWSCI display power state (git-fixes).
- drm/i915: Correctly populate use_sagv_wm for all pipes (git-fixes).
- drm/i915: Fix bw atomic check when switching between SAGV vs. no SAGV (git-fixes).
- drm/panel: simple: Assign data from panel_dpi_probe() correctly (git-fixes).
- drm/radeon: Fix backlight control on iMac 12,1 (git-fixes).
- drm/rockchip: dw_hdmi: Do not leave clock enabled in error case (git-fixes).
- drm/rockchip: vop: Correct RK3399 VOP register fields (git-fixes).
- drm/vc4: hdmi: Allow DBLCLK modes even if horz timing is odd (git-fixes).
- drm: panel-orientation-quirks: Add quirk for the 1Netbook OneXPlayer (git-fixes).
- ext4: check for inconsistent extents between index and leaf block (bsc#1194163 bsc#1196339).
- ext4: check for out-of-order index extents in ext4_valid_extent_entries() (bsc#1194163 bsc#1196339).
- ext4: prevent partial update of the extent blocks (bsc#1194163 bsc#1196339).
- gve: Add RX context (bsc#1191655).
- gve: Add a jumbo-frame device option (bsc#1191655).
- gve: Add consumed counts to ethtool stats (bsc#1191655).
- gve: Add optional metadata descriptor type GVE_TXD_MTD (bsc#1191655).
- gve: Correct order of processing device options (bsc#1191655).
- gve: Fix GFP flags when allocing pages (git-fixes).
- gve: Fix off by one in gve_tx_timeout() (bsc#1191655).
- gve: Implement packet continuation for RX (bsc#1191655).
- gve: Implement suspend/resume/shutdown (bsc#1191655).
- gve: Move the irq db indexes out of the ntfy block struct (bsc#1191655).
- gve: Recording rx queue before sending to napi (bsc#1191655).
- gve: Recover from queue stall due to missed IRQ (bsc#1191655).
- gve: Update gve_free_queue_page_list signature (bsc#1191655).
- gve: Use kvcalloc() instead of kvzalloc() (bsc#1191655).
- gve: fix for null pointer dereference (bsc#1191655).
- gve: fix the wrong AdminQ buffer queue index check (bsc#1176940).
- gve: fix unmatched u64_stats_update_end() (bsc#1191655).
- gve: remove memory barrier around seqno (bsc#1191655).
- i2c: brcmstb: fix support for DSL and CM variants (git-fixes).
- i40e: Fix for failed to init adminq while VF reset (git-fixes).
- i40e: Fix issue when maximum queues is exceeded (git-fixes).
- i40e: Fix queues reservation for XDP (git-fixes).
- i40e: Increase delay to 1 s after global EMP reset (git-fixes).
- i40e: fix unsigned stat widths (git-fixes).
- ibmvnic: Allow queueing resets during probe (bsc#1196516 ltc#196391).
- ibmvnic: clear fop when retrying probe (bsc#1196516 ltc#196391).
- ibmvnic: complete init_done on transport events (bsc#1196516 ltc#196391).
- ibmvnic: define flush_reset_queue helper (bsc#1196516 ltc#196391).
- ibmvnic: do not release napi in __ibmvnic_open() (bsc#1195668 ltc#195811).
- ibmvnic: free reset-work-item when flushing (bsc#1196516 ltc#196391).
- ibmvnic: init init_done_rc earlier (bsc#1196516 ltc#196391).
- ibmvnic: initialize rc before completing wait (bsc#1196516 ltc#196391).
- ibmvnic: register netdev after init of adapter (bsc#1196516 ltc#196391).
- ibmvnic: schedule failover only if vioctl fails (bsc#1196400 ltc#195815).
- ice: fix IPIP and SIT TSO offload (git-fixes).
- ice: fix an error code in ice_cfg_phy_fec() (jsc#SLE-12878).
- ima: Allow template selection with ima_template[_fmt]= after ima_hash= (git-fixes).
- ima: Do not print policy rule with inactive LSM labels (git-fixes).
- ima: Remove ima_policy file before directory (git-fixes).
- integrity: Make function integrity_add_key() static (git-fixes).
- integrity: check the return value of audit_log_start() (git-fixes).
- integrity: double check iint_cache was initialized (git-fixes).
- iommu/amd: Fix loop timeout issue in iommu_ga_log_enable() (git-fixes).
- iommu/amd: Remove useless irq affinity notifier (git-fixes).
- iommu/amd: Restore GA log/tail pointer on host resume (git-fixes).
- iommu/amd: X2apic mode: mask/unmask interrupts on suspend/resume (git-fixes).
- iommu/amd: X2apic mode: re-enable after resume (git-fixes).
- iommu/amd: X2apic mode: setup the INTX registers on mask/unmask (git-fixes).
- iommu/io-pgtable-arm-v7s: Add error handle for page table allocation failure (git-fixes).
- iommu/io-pgtable-arm: Fix table descriptor paddr formatting (git-fixes).
- iommu/iova: Fix race between FQ timeout and teardown (git-fixes).
- iommu/vt-d: Fix potential memory leak in intel_setup_irq_remapping() (git-fixes).
- iwlwifi: fix use-after-free (git-fixes).
- iwlwifi: pcie: fix locking when 'HW not ready' (git-fixes).
- iwlwifi: pcie: gen2: fix locking when 'HW not ready' (git-fixes).
- ixgbevf: Require large buffers for build_skb on 82599VF (git-fixes).
- kABI fixup after adding vcpu_idx to struct kvm_cpu (bsc#1190972 LTC#194674).
- kABI: Fix kABI for AMD IOMMU driver (git-fixes).
- kabi: Hide changes to s390/AP structures (jsc#SLE-20807).
- lib/iov_iter: initialize 'flags' in new pipe_buffer (bsc#1196584).
- libsubcmd: Fix use-after-free for realloc(..., 0) (git-fixes).
- md/raid5: fix oops during stripe resizing (bsc#1181588).
- misc: fastrpc: avoid double fput() on failed usercopy (git-fixes).
- mmc: sdhci-of-esdhc: Check for error num after setting mask (git-fixes).
- mtd: rawnand: brcmnand: Fixed incorrect sub-page ECC status (git-fixes).
- mtd: rawnand: gpmi: do not leak PM reference in error path (git-fixes).
- mtd: rawnand: qcom: Fix clock sequencing in qcom_nandc_probe() (git-fixes).
- net/ibmvnic: Cleanup workaround doing an EOI after partition migration (bsc#1089644 ltc#166495 ltc#165544 git-fixes).
- net/mlx5e: Fix handling of wrong devices during bond netevent (jsc#SLE-15172).
- net: macb: Align the dma and coherent dma masks (git-fixes).
- net: mdio: aspeed: Add missing MODULE_DEVICE_TABLE (bsc#1176447).
- net: phy: marvell: Fix MDI-x polarity setting in 88e1118-compatible PHYs (git-fixes).
- net: phy: marvell: Fix RGMII Tx/Rx delays setting in 88e1121-compatible PHYs (git-fixes).
- net: phy: marvell: configure RGMII delays for 88E1118 (git-fixes).
- net: usb: qmi_wwan: Add support for Dell DW5829e (git-fixes).
- nfp: flower: fix ida_idx not being released (bsc#1154353).
- nfsd: allow delegation state ids to be revoked and then freed (bsc#1192483).
- nfsd: allow lock state ids to be revoked and then freed (bsc#1192483).
- nfsd: allow open state ids to be revoked and then freed (bsc#1192483).
- nfsd: do not admin-revoke NSv4.0 state ids (bsc#1192483).
- nfsd: prepare for supporting admin-revocation of state (bsc#1192483).
- nvme-fabrics: fix state check in nvmf_ctlr_matches_baseopts() (bsc#1195012).
- nvme: also mark passthrough-only namespaces ready in nvme_update_ns_info (git-fixes).
- nvme: do not return an error from nvme_configure_metadata (git-fixes).
- nvme: let namespace probing continue for unsupported features (git-fixes).
- powerpc/64: Move paca allocation later in boot (bsc#1190812).
- powerpc/64s: Fix debugfs_simple_attr.cocci warnings (bsc#1157038 bsc#1157923 ltc#182612 git-fixes).
- powerpc/pseries/ddw: Revert 'Extend upper limit for huge DMA window for persistent memory' (bsc#1195995 ltc#196394).
- powerpc/pseries: read the lpar name from the firmware (bsc#1187716 ltc#193451).
- powerpc: Set crashkernel offset to mid of RMA region (bsc#1190812).
- powerpc: add link stack flush mitigation status in debugfs (bsc#1157038 bsc#1157923 ltc#182612 git-fixes).
- s390/AP: support new dynamic AP bus size limit (jsc#SLE-20807).
- s390/bpf: Fix 64-bit subtraction of the -0x80000000 constant (git-fixes).
- s390/bpf: Fix optimizing out zero-extensions (git-fixes).
- s390/cio: make ccw_device_dma_* more robust (bsc#1193243 LTC#195549).
- s390/cio: verify the driver availability for path_event call (bsc#1195928 LTC#196418).
- s390/cpumf: Support for CPU Measurement Facility CSVN 7 (bsc#1195081 LTC#196088).
- s390/cpumf: Support for CPU Measurement Sampling Facility LS bit (bsc#1195081 LTC#196088).
- s390/pci: add s390_iommu_aperture kernel parameter (bsc#1193233 LTC#195540).
- s390/pci: move pseudo-MMIO to prevent MIO overlap (bsc#1194967 LTC#196028).
- s390/protvirt: fix error return code in uv_info_init() (jsc#SLE-22135).
- s390/sclp: fix Secure-IPL facility detection (bsc#1191741 LTC#194816).
- s390/uv: add prot virt guest/host indication files (jsc#SLE-22135).
- s390/uv: fix prot virt host indication compilation (jsc#SLE-22135).
- scsi: core: Add a new error code DID_TRANSPORT_MARGINAL in scsi.h (bsc#1195506).
- scsi: core: Add limitless cmd retry support (bsc#1195506).
- scsi: core: No retries on abort success (bsc#1195506).
- scsi: kABI fix for 'eh_should_retry_cmd' (bsc#1195506).
- scsi: lpfc: Add support for eh_should_retry_cmd() (bsc#1195506).
- scsi: lpfc: Fix pt2pt NVMe PRLI reject LOGO loop (bsc#1189126).
- scsi: qla2xxx: Add devids and conditionals for 28xx (bsc#1195823).
- scsi: qla2xxx: Add marginal path handling support (bsc#1195506).
- scsi: qla2xxx: Add ql2xnvme_queues module param to configure number of NVMe queues (bsc#1195823).
- scsi: qla2xxx: Add qla2x00_async_done() for async routines (bsc#1195823).
- scsi: qla2xxx: Add retry for exec firmware (bsc#1195823).
- scsi: qla2xxx: Check for firmware dump already collected (bsc#1195823).
- scsi: qla2xxx: Fix T10 PI tag escape and IP guard options for 28XX adapters (bsc#1195823).
- scsi: qla2xxx: Fix device reconnect in loop topology (bsc#1195823).
- scsi: qla2xxx: Fix premature hw access after PCI error (bsc#1195823).
- scsi: qla2xxx: Fix scheduling while atomic (bsc#1195823).
- scsi: qla2xxx: Fix stuck session in gpdb (bsc#1195823).
- scsi: qla2xxx: Fix unmap of already freed sgl (bsc#1195823).
- scsi: qla2xxx: Fix warning for missing error code (bsc#1195823).
- scsi: qla2xxx: Fix warning message due to adisc being flushed (bsc#1195823).
- scsi: qla2xxx: Fix wrong FDMI data for 64G adapter (bsc#1195823).
- scsi: qla2xxx: Implement ref count for SRB (bsc#1195823).
- scsi: qla2xxx: Refactor asynchronous command initialization (bsc#1195823).
- scsi: qla2xxx: Remove a declaration (bsc#1195823).
- scsi: qla2xxx: Remove unused qla_sess_op_cmd_list from scsi_qla_host_t (bsc#1195823).
- scsi: qla2xxx: Return -ENOMEM if kzalloc() fails (bsc#1195823).
- scsi: qla2xxx: Suppress a kernel complaint in qla_create_qpair() (bsc#1195823).
- scsi: qla2xxx: Update version to 10.02.07.200-k (bsc#1195823).
- scsi: qla2xxx: Update version to 10.02.07.300-k (bsc#1195823).
- scsi: qla2xxx: edif: Fix clang warning (bsc#1195823).
- scsi: qla2xxx: edif: Fix inconsistent check of db_flags (bsc#1195823).
- scsi: qla2xxx: edif: Reduce connection thrash (bsc#1195823).
- scsi: qla2xxx: edif: Replace list_for_each_safe with list_for_each_entry_safe (bsc#1195823).
- scsi: qla2xxx: edif: Tweak trace message (bsc#1195823).
- scsi: scsi_transport_fc: Add a new rport state FC_PORTSTATE_MARGINAL (bsc#1195506).
- scsi: scsi_transport_fc: Add store capability to rport port_state in sysfs (bsc#1195506).
- scsi: target: iscsi: Fix cmd abort fabric stop race (bsc#1195286).
- scsi: zfcp: Fix failed recovery on gone remote port with non-NPIV FCP devices (bsc#1195378 LTC#196244).
- scsi_transport_fc: kabi fix blank out FC_PORTSTATE_MARGINAL (bsc#1195506).
- staging/fbtft: Fix backlight (git-fixes).
- staging: fbtft: Fix error path in fbtft_driver_module_init() (git-fixes).
- tracing: Do not inc err_log entry count if entry allocation fails (git-fixes).
- tracing: Dump stacktrace trigger to the corresponding instance (git-fixes).
- tracing: Fix smatch warning for null glob in event_hist_trigger_parse() (git-fixes).
- tracing: Have traceon and traceoff trigger honor the instance (git-fixes).
- tracing: Propagate is_signed to expression (git-fixes).
- usb: dwc2: Fix NULL qh in dwc2_queue_transaction (git-fixes).
- usb: dwc2: gadget: do not try to disable ep0 in dwc2_hsotg_suspend (git-fixes).
- usb: dwc3: do not set gadget->is_otg flag (git-fixes).
- usb: dwc3: gadget: Prevent core from processing stale TRBs (git-fixes).
- usb: f_fs: Fix use-after-free for epfile (git-fixes).
- usb: gadget: f_uac2: Define specific wTerminalType (git-fixes).
- usb: gadget: rndis: check size of RNDIS_MSG_SET command (git-fixes).
- usb: gadget: s3c: remove unused 'udc' variable (git-fixes).
- usb: gadget: udc: renesas_usb3: Fix host to USB_ROLE_NONE transition (git-fixes).
- usb: host: ehci-tegra: Fix error handling in tegra_ehci_probe() (git-fixes).
- usb: ulpi: Call of_node_put correctly (git-fixes).
- usb: ulpi: Move of_node_put to ulpi_dev_release (git-fixes).
Patchnames
SUSE-2022-763,SUSE-SLE-Module-RT-15-SP3-2022-763,SUSE-SUSE-MicroOS-5.1-2022-763
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 15 SP3 RT kernel was updated to receive various security and bugfixes.\n\n\nTransient execution side-channel attacks attacking the Branch History Buffer (BHB),\nnamed \u0027Branch Target Injection\u0027 and \u0027Intra-Mode Branch History Injection\u0027 are now mitigated.\n\nThe following security bugs were fixed:\n\n- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).\n- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).\n- CVE-2022-0847: Fixed a vulnerability were a local attackers could overwrite data in arbitrary (read-only) files (bsc#1196584).\n- CVE-2022-25375: The RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command. Attackers can obtain sensitive information from kernel memory (bnc#1196235 ).\n\nThe following non-security bugs were fixed:\n\n- ACPI/IORT: Check node revision for PMCG resources (git-fixes).\n- ALSA: hda/realtek: Add missing fixup-model entry for Gigabyte X570 ALC1220 quirks (git-fixes).\n- ALSA: hda/realtek: Add quirk for ASUS GU603 (git-fixes).\n- ALSA: hda/realtek: Fix silent output on Gigabyte X570 Aorus Xtreme after reboot from Windows (git-fixes).\n- ALSA: hda/realtek: Fix silent output on Gigabyte X570S Aorus Master (newer chipset) (git-fixes).\n- ALSA: hda: Fix missing codec probe on Shenker Dock 15 (git-fixes).\n- ALSA: hda: Fix regression on forced probe mask option (git-fixes).\n- ASoC: Revert \u0027ASoC: mediatek: Check for error clk pointer\u0027 (git-fixes).\n- ASoC: ops: Fix stereo change notifications in snd_soc_put_volsw() (git-fixes).\n- ASoC: ops: Fix stereo change notifications in snd_soc_put_volsw_range() (git-fixes).\n- ASoC: ops: Reject out of bounds values in snd_soc_put_volsw() (git-fixes).\n- ASoC: ops: Reject out of bounds values in snd_soc_put_volsw_sx() (git-fixes).\n- ASoC: ops: Reject out of bounds values in snd_soc_put_xr_sx() (git-fixes).\n- Align s390 NVME target options with other architectures (bsc#1188404, jsc#SLE-22494). CONFIG_NVME_TARGET=m CONFIG_NVME_TARGET_PASSTHRU=y CONFIG_NVME_TARGET_LOOP=m CONFIG_NVME_TARGET_RDMA=m CONFIG_NVME_TARGET_FC=m CONFIG_NVME_TARGET_FCLOOP=m CONFIG_NVME_TARGET_TCP=m\n- EDAC/xgene: Fix deferred probing (bsc#1178134).\n- HID:Add support for UGTABLET WP5540 (git-fixes).\n- IB/cma: Do not send IGMP leaves for sendonly Multicast groups (git-fixes).\n- IB/hfi1: Fix AIP early init panic (jsc#SLE-13208).\n- KVM: remember position in kvm-\u003evcpus array (bsc#1190972 LTC#194674).\n- NFSD: Fix the behavior of READ near OFFSET_MAX (bsc#1195957).\n- PM: hibernate: Remove register_nosave_region_late() (git-fixes).\n- PM: s2idle: ACPI: Fix wakeup interrupts handling (git-fixes).\n- RDMA/cma: Use correct address when leaving multicast group (bsc#1181147).\n- RDMA/ucma: Protect mc during concurrent multicast leaves (bsc#1181147).\n- USB: serial: ch341: add support for GW Instek USB2.0-Serial devices (git-fixes).\n- USB: serial: cp210x: add CPI Bulk Coin Recycler id (git-fixes).\n- USB: serial: cp210x: add NCR Retail IO box id (git-fixes).\n- USB: serial: ftdi_sio: add support for Brainboxes US-159/235/320 (git-fixes).\n- USB: serial: mos7840: remove duplicated 0xac24 device ID (git-fixes).\n- USB: serial: option: add ZTE MF286D modem (git-fixes).\n- ata: libata-core: Disable TRIM on M88V29 (git-fixes).\n- ax25: improve the incomplete fix to avoid UAF and NPD bugs (git-fixes).\n- blk-mq: always allow reserved allocation in hctx_may_queue (bsc#1193787).\n- blk-mq: avoid to iterate over stale request (bsc#1193787).\n- blk-mq: clear stale request in tags-\u003erq before freeing one request pool (bsc#1193787).\n- blk-mq: clearing flush request reference in tags-\u003erqs (bsc#1193787).\n- blk-mq: do not grab rq\u0027s refcount in blk_mq_check_expired() (bsc#1193787 git-fixes).\n- blk-mq: fix is_flush_rq (bsc#1193787 git-fixes).\n- blk-mq: fix kernel panic during iterating over flush request (bsc#1193787 git-fixes).\n- blk-mq: grab rq-\u003erefcount before calling -\u003efn in blk_mq_tagset_busy_iter (bsc#1193787).\n- blk-mq: mark flush request as IDLE in flush_end_io() (bsc#1193787).\n- blk-tag: Hide spin_lock (bsc#1193787).\n- block: avoid double io accounting for flush request (bsc#1193787).\n- block: do not send a rezise udev event for hidden block device (bsc#1193096).\n- block: mark flush request as IDLE when it is really finished (bsc#1193787).\n- bonding: pair enable_port with slave_arr_updates (git-fixes).\n- btrfs: check for missing device in btrfs_trim_fs (bsc#1195701).\n- btrfs: check worker before need_preemptive_reclaim (bsc#1196195).\n- btrfs: do not do preemptive flushing if the majority is global rsv (bsc#1196195).\n- btrfs: do not include the global rsv size in the preemptive used amount (bsc#1196195).\n- btrfs: handle preemptive delalloc flushing slightly differently (bsc#1196195).\n- btrfs: make sure SB_I_VERSION does not get unset by remount (bsc#1192210).\n- btrfs: only clamp the first time we have to start flushing (bsc#1196195).\n- btrfs: only ignore delalloc if delalloc is much smaller than ordered (bsc#1196195).\n- btrfs: reduce the preemptive flushing threshold to 90% (bsc#1196195).\n- btrfs: take into account global rsv in need_preemptive_reclaim (bsc#1196195).\n- btrfs: use the global rsv size in the preemptive thresh calculation (bsc#1196195).\n- ceph: properly put ceph_string reference after async create attempt (bsc#1195798).\n- ceph: set pool_ns in new inode layout for async creates (bsc#1195799).\n- drm/amdgpu: fix logic inversion in check (git-fixes).\n- drm/i915/gvt: Make DRM_I915_GVT depend on X86 (git-fixes).\n- drm/i915/gvt: clean up kernel-doc in gtt.c (git-fixes).\n- drm/i915/opregion: check port number bounds for SWSCI display power state (git-fixes).\n- drm/i915: Correctly populate use_sagv_wm for all pipes (git-fixes).\n- drm/i915: Fix bw atomic check when switching between SAGV vs. no SAGV (git-fixes).\n- drm/panel: simple: Assign data from panel_dpi_probe() correctly (git-fixes).\n- drm/radeon: Fix backlight control on iMac 12,1 (git-fixes).\n- drm/rockchip: dw_hdmi: Do not leave clock enabled in error case (git-fixes).\n- drm/rockchip: vop: Correct RK3399 VOP register fields (git-fixes).\n- drm/vc4: hdmi: Allow DBLCLK modes even if horz timing is odd (git-fixes).\n- drm: panel-orientation-quirks: Add quirk for the 1Netbook OneXPlayer (git-fixes).\n- ext4: check for inconsistent extents between index and leaf block (bsc#1194163 bsc#1196339).\n- ext4: check for out-of-order index extents in ext4_valid_extent_entries() (bsc#1194163 bsc#1196339).\n- ext4: prevent partial update of the extent blocks (bsc#1194163 bsc#1196339).\n- gve: Add RX context (bsc#1191655).\n- gve: Add a jumbo-frame device option (bsc#1191655).\n- gve: Add consumed counts to ethtool stats (bsc#1191655).\n- gve: Add optional metadata descriptor type GVE_TXD_MTD (bsc#1191655).\n- gve: Correct order of processing device options (bsc#1191655).\n- gve: Fix GFP flags when allocing pages (git-fixes).\n- gve: Fix off by one in gve_tx_timeout() (bsc#1191655).\n- gve: Implement packet continuation for RX (bsc#1191655).\n- gve: Implement suspend/resume/shutdown (bsc#1191655).\n- gve: Move the irq db indexes out of the ntfy block struct (bsc#1191655).\n- gve: Recording rx queue before sending to napi (bsc#1191655).\n- gve: Recover from queue stall due to missed IRQ (bsc#1191655).\n- gve: Update gve_free_queue_page_list signature (bsc#1191655).\n- gve: Use kvcalloc() instead of kvzalloc() (bsc#1191655).\n- gve: fix for null pointer dereference (bsc#1191655).\n- gve: fix the wrong AdminQ buffer queue index check (bsc#1176940).\n- gve: fix unmatched u64_stats_update_end() (bsc#1191655).\n- gve: remove memory barrier around seqno (bsc#1191655).\n- i2c: brcmstb: fix support for DSL and CM variants (git-fixes).\n- i40e: Fix for failed to init adminq while VF reset (git-fixes).\n- i40e: Fix issue when maximum queues is exceeded (git-fixes).\n- i40e: Fix queues reservation for XDP (git-fixes).\n- i40e: Increase delay to 1 s after global EMP reset (git-fixes).\n- i40e: fix unsigned stat widths (git-fixes).\n- ibmvnic: Allow queueing resets during probe (bsc#1196516 ltc#196391).\n- ibmvnic: clear fop when retrying probe (bsc#1196516 ltc#196391).\n- ibmvnic: complete init_done on transport events (bsc#1196516 ltc#196391).\n- ibmvnic: define flush_reset_queue helper (bsc#1196516 ltc#196391).\n- ibmvnic: do not release napi in __ibmvnic_open() (bsc#1195668 ltc#195811).\n- ibmvnic: free reset-work-item when flushing (bsc#1196516 ltc#196391).\n- ibmvnic: init init_done_rc earlier (bsc#1196516 ltc#196391).\n- ibmvnic: initialize rc before completing wait (bsc#1196516 ltc#196391).\n- ibmvnic: register netdev after init of adapter (bsc#1196516 ltc#196391).\n- ibmvnic: schedule failover only if vioctl fails (bsc#1196400 ltc#195815).\n- ice: fix IPIP and SIT TSO offload (git-fixes).\n- ice: fix an error code in ice_cfg_phy_fec() (jsc#SLE-12878).\n- ima: Allow template selection with ima_template[_fmt]= after ima_hash= (git-fixes).\n- ima: Do not print policy rule with inactive LSM labels (git-fixes).\n- ima: Remove ima_policy file before directory (git-fixes).\n- integrity: Make function integrity_add_key() static (git-fixes).\n- integrity: check the return value of audit_log_start() (git-fixes).\n- integrity: double check iint_cache was initialized (git-fixes).\n- iommu/amd: Fix loop timeout issue in iommu_ga_log_enable() (git-fixes).\n- iommu/amd: Remove useless irq affinity notifier (git-fixes).\n- iommu/amd: Restore GA log/tail pointer on host resume (git-fixes).\n- iommu/amd: X2apic mode: mask/unmask interrupts on suspend/resume (git-fixes).\n- iommu/amd: X2apic mode: re-enable after resume (git-fixes).\n- iommu/amd: X2apic mode: setup the INTX registers on mask/unmask (git-fixes).\n- iommu/io-pgtable-arm-v7s: Add error handle for page table allocation failure (git-fixes).\n- iommu/io-pgtable-arm: Fix table descriptor paddr formatting (git-fixes).\n- iommu/iova: Fix race between FQ timeout and teardown (git-fixes).\n- iommu/vt-d: Fix potential memory leak in intel_setup_irq_remapping() (git-fixes).\n- iwlwifi: fix use-after-free (git-fixes).\n- iwlwifi: pcie: fix locking when \u0027HW not ready\u0027 (git-fixes).\n- iwlwifi: pcie: gen2: fix locking when \u0027HW not ready\u0027 (git-fixes).\n- ixgbevf: Require large buffers for build_skb on 82599VF (git-fixes).\n- kABI fixup after adding vcpu_idx to struct kvm_cpu (bsc#1190972 LTC#194674).\n- kABI: Fix kABI for AMD IOMMU driver (git-fixes).\n- kabi: Hide changes to s390/AP structures (jsc#SLE-20807).\n- lib/iov_iter: initialize \u0027flags\u0027 in new pipe_buffer (bsc#1196584).\n- libsubcmd: Fix use-after-free for realloc(..., 0) (git-fixes).\n- md/raid5: fix oops during stripe resizing (bsc#1181588).\n- misc: fastrpc: avoid double fput() on failed usercopy (git-fixes).\n- mmc: sdhci-of-esdhc: Check for error num after setting mask (git-fixes).\n- mtd: rawnand: brcmnand: Fixed incorrect sub-page ECC status (git-fixes).\n- mtd: rawnand: gpmi: do not leak PM reference in error path (git-fixes).\n- mtd: rawnand: qcom: Fix clock sequencing in qcom_nandc_probe() (git-fixes).\n- net/ibmvnic: Cleanup workaround doing an EOI after partition migration (bsc#1089644 ltc#166495 ltc#165544 git-fixes).\n- net/mlx5e: Fix handling of wrong devices during bond netevent (jsc#SLE-15172).\n- net: macb: Align the dma and coherent dma masks (git-fixes).\n- net: mdio: aspeed: Add missing MODULE_DEVICE_TABLE (bsc#1176447).\n- net: phy: marvell: Fix MDI-x polarity setting in 88e1118-compatible PHYs (git-fixes).\n- net: phy: marvell: Fix RGMII Tx/Rx delays setting in 88e1121-compatible PHYs (git-fixes).\n- net: phy: marvell: configure RGMII delays for 88E1118 (git-fixes).\n- net: usb: qmi_wwan: Add support for Dell DW5829e (git-fixes).\n- nfp: flower: fix ida_idx not being released (bsc#1154353).\n- nfsd: allow delegation state ids to be revoked and then freed (bsc#1192483).\n- nfsd: allow lock state ids to be revoked and then freed (bsc#1192483).\n- nfsd: allow open state ids to be revoked and then freed (bsc#1192483).\n- nfsd: do not admin-revoke NSv4.0 state ids (bsc#1192483).\n- nfsd: prepare for supporting admin-revocation of state (bsc#1192483).\n- nvme-fabrics: fix state check in nvmf_ctlr_matches_baseopts() (bsc#1195012).\n- nvme: also mark passthrough-only namespaces ready in nvme_update_ns_info (git-fixes).\n- nvme: do not return an error from nvme_configure_metadata (git-fixes).\n- nvme: let namespace probing continue for unsupported features (git-fixes).\n- powerpc/64: Move paca allocation later in boot (bsc#1190812).\n- powerpc/64s: Fix debugfs_simple_attr.cocci warnings (bsc#1157038 bsc#1157923 ltc#182612 git-fixes).\n- powerpc/pseries/ddw: Revert \u0027Extend upper limit for huge DMA window for persistent memory\u0027 (bsc#1195995 ltc#196394).\n- powerpc/pseries: read the lpar name from the firmware (bsc#1187716 ltc#193451).\n- powerpc: Set crashkernel offset to mid of RMA region (bsc#1190812).\n- powerpc: add link stack flush mitigation status in debugfs (bsc#1157038 bsc#1157923 ltc#182612 git-fixes).\n- s390/AP: support new dynamic AP bus size limit (jsc#SLE-20807).\n- s390/bpf: Fix 64-bit subtraction of the -0x80000000 constant (git-fixes).\n- s390/bpf: Fix optimizing out zero-extensions (git-fixes).\n- s390/cio: make ccw_device_dma_* more robust (bsc#1193243 LTC#195549).\n- s390/cio: verify the driver availability for path_event call (bsc#1195928 LTC#196418).\n- s390/cpumf: Support for CPU Measurement Facility CSVN 7 (bsc#1195081 LTC#196088).\n- s390/cpumf: Support for CPU Measurement Sampling Facility LS bit (bsc#1195081 LTC#196088).\n- s390/pci: add s390_iommu_aperture kernel parameter (bsc#1193233 LTC#195540).\n- s390/pci: move pseudo-MMIO to prevent MIO overlap (bsc#1194967 LTC#196028).\n- s390/protvirt: fix error return code in uv_info_init() (jsc#SLE-22135).\n- s390/sclp: fix Secure-IPL facility detection (bsc#1191741 LTC#194816).\n- s390/uv: add prot virt guest/host indication files (jsc#SLE-22135).\n- s390/uv: fix prot virt host indication compilation (jsc#SLE-22135).\n- scsi: core: Add a new error code DID_TRANSPORT_MARGINAL in scsi.h (bsc#1195506).\n- scsi: core: Add limitless cmd retry support (bsc#1195506).\n- scsi: core: No retries on abort success (bsc#1195506).\n- scsi: kABI fix for \u0027eh_should_retry_cmd\u0027 (bsc#1195506).\n- scsi: lpfc: Add support for eh_should_retry_cmd() (bsc#1195506).\n- scsi: lpfc: Fix pt2pt NVMe PRLI reject LOGO loop (bsc#1189126).\n- scsi: qla2xxx: Add devids and conditionals for 28xx (bsc#1195823).\n- scsi: qla2xxx: Add marginal path handling support (bsc#1195506).\n- scsi: qla2xxx: Add ql2xnvme_queues module param to configure number of NVMe queues (bsc#1195823).\n- scsi: qla2xxx: Add qla2x00_async_done() for async routines (bsc#1195823).\n- scsi: qla2xxx: Add retry for exec firmware (bsc#1195823).\n- scsi: qla2xxx: Check for firmware dump already collected (bsc#1195823).\n- scsi: qla2xxx: Fix T10 PI tag escape and IP guard options for 28XX adapters (bsc#1195823).\n- scsi: qla2xxx: Fix device reconnect in loop topology (bsc#1195823).\n- scsi: qla2xxx: Fix premature hw access after PCI error (bsc#1195823).\n- scsi: qla2xxx: Fix scheduling while atomic (bsc#1195823).\n- scsi: qla2xxx: Fix stuck session in gpdb (bsc#1195823).\n- scsi: qla2xxx: Fix unmap of already freed sgl (bsc#1195823).\n- scsi: qla2xxx: Fix warning for missing error code (bsc#1195823).\n- scsi: qla2xxx: Fix warning message due to adisc being flushed (bsc#1195823).\n- scsi: qla2xxx: Fix wrong FDMI data for 64G adapter (bsc#1195823).\n- scsi: qla2xxx: Implement ref count for SRB (bsc#1195823).\n- scsi: qla2xxx: Refactor asynchronous command initialization (bsc#1195823).\n- scsi: qla2xxx: Remove a declaration (bsc#1195823).\n- scsi: qla2xxx: Remove unused qla_sess_op_cmd_list from scsi_qla_host_t (bsc#1195823).\n- scsi: qla2xxx: Return -ENOMEM if kzalloc() fails (bsc#1195823).\n- scsi: qla2xxx: Suppress a kernel complaint in qla_create_qpair() (bsc#1195823).\n- scsi: qla2xxx: Update version to 10.02.07.200-k (bsc#1195823).\n- scsi: qla2xxx: Update version to 10.02.07.300-k (bsc#1195823).\n- scsi: qla2xxx: edif: Fix clang warning (bsc#1195823).\n- scsi: qla2xxx: edif: Fix inconsistent check of db_flags (bsc#1195823).\n- scsi: qla2xxx: edif: Reduce connection thrash (bsc#1195823).\n- scsi: qla2xxx: edif: Replace list_for_each_safe with list_for_each_entry_safe (bsc#1195823).\n- scsi: qla2xxx: edif: Tweak trace message (bsc#1195823).\n- scsi: scsi_transport_fc: Add a new rport state FC_PORTSTATE_MARGINAL (bsc#1195506).\n- scsi: scsi_transport_fc: Add store capability to rport port_state in sysfs (bsc#1195506).\n- scsi: target: iscsi: Fix cmd abort fabric stop race (bsc#1195286).\n- scsi: zfcp: Fix failed recovery on gone remote port with non-NPIV FCP devices (bsc#1195378 LTC#196244).\n- scsi_transport_fc: kabi fix blank out FC_PORTSTATE_MARGINAL (bsc#1195506).\n- staging/fbtft: Fix backlight (git-fixes).\n- staging: fbtft: Fix error path in fbtft_driver_module_init() (git-fixes).\n- tracing: Do not inc err_log entry count if entry allocation fails (git-fixes).\n- tracing: Dump stacktrace trigger to the corresponding instance (git-fixes).\n- tracing: Fix smatch warning for null glob in event_hist_trigger_parse() (git-fixes).\n- tracing: Have traceon and traceoff trigger honor the instance (git-fixes).\n- tracing: Propagate is_signed to expression (git-fixes).\n- usb: dwc2: Fix NULL qh in dwc2_queue_transaction (git-fixes).\n- usb: dwc2: gadget: do not try to disable ep0 in dwc2_hsotg_suspend (git-fixes).\n- usb: dwc3: do not set gadget-\u003eis_otg flag (git-fixes).\n- usb: dwc3: gadget: Prevent core from processing stale TRBs (git-fixes).\n- usb: f_fs: Fix use-after-free for epfile (git-fixes).\n- usb: gadget: f_uac2: Define specific wTerminalType (git-fixes).\n- usb: gadget: rndis: check size of RNDIS_MSG_SET command (git-fixes).\n- usb: gadget: s3c: remove unused \u0027udc\u0027 variable (git-fixes).\n- usb: gadget: udc: renesas_usb3: Fix host to USB_ROLE_NONE transition (git-fixes).\n- usb: host: ehci-tegra: Fix error handling in tegra_ehci_probe() (git-fixes).\n- usb: ulpi: Call of_node_put correctly (git-fixes).\n- usb: ulpi: Move of_node_put to ulpi_dev_release (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-763,SUSE-SLE-Module-RT-15-SP3-2022-763,SUSE-SUSE-MicroOS-5.1-2022-763", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0763-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:0763-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220763-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:0763-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010391.html" }, { "category": "self", "summary": "SUSE Bug 1089644", "url": "https://bugzilla.suse.com/1089644" }, { "category": "self", "summary": "SUSE Bug 1154353", "url": "https://bugzilla.suse.com/1154353" }, { "category": "self", "summary": "SUSE Bug 1157038", "url": "https://bugzilla.suse.com/1157038" }, { "category": "self", "summary": "SUSE Bug 1157923", "url": "https://bugzilla.suse.com/1157923" }, { "category": "self", "summary": "SUSE Bug 1176447", "url": "https://bugzilla.suse.com/1176447" }, { "category": "self", "summary": "SUSE Bug 1176940", "url": "https://bugzilla.suse.com/1176940" }, { "category": "self", "summary": "SUSE Bug 1178134", "url": "https://bugzilla.suse.com/1178134" }, { "category": "self", "summary": "SUSE Bug 1181147", "url": "https://bugzilla.suse.com/1181147" }, { "category": "self", "summary": "SUSE Bug 1181588", "url": "https://bugzilla.suse.com/1181588" }, { "category": "self", "summary": "SUSE Bug 1183872", "url": "https://bugzilla.suse.com/1183872" }, { "category": "self", "summary": "SUSE Bug 1187716", "url": "https://bugzilla.suse.com/1187716" }, { "category": "self", "summary": "SUSE Bug 1188404", "url": "https://bugzilla.suse.com/1188404" }, { "category": "self", "summary": "SUSE Bug 1189126", "url": "https://bugzilla.suse.com/1189126" }, { "category": "self", "summary": "SUSE Bug 1190812", "url": "https://bugzilla.suse.com/1190812" }, { "category": "self", "summary": "SUSE Bug 1190972", "url": "https://bugzilla.suse.com/1190972" }, { "category": "self", "summary": "SUSE Bug 1191580", "url": "https://bugzilla.suse.com/1191580" }, { "category": "self", "summary": "SUSE Bug 1191655", "url": "https://bugzilla.suse.com/1191655" }, { "category": "self", "summary": "SUSE Bug 1191741", "url": "https://bugzilla.suse.com/1191741" }, { "category": "self", "summary": "SUSE Bug 1192210", "url": "https://bugzilla.suse.com/1192210" }, { "category": "self", "summary": "SUSE Bug 1192483", "url": "https://bugzilla.suse.com/1192483" }, { "category": "self", "summary": "SUSE Bug 1193096", "url": "https://bugzilla.suse.com/1193096" }, { "category": "self", "summary": "SUSE Bug 1193233", "url": "https://bugzilla.suse.com/1193233" }, { "category": "self", "summary": "SUSE Bug 1193243", "url": "https://bugzilla.suse.com/1193243" }, { "category": "self", "summary": "SUSE Bug 1193787", "url": "https://bugzilla.suse.com/1193787" }, { "category": "self", "summary": "SUSE Bug 1194163", "url": "https://bugzilla.suse.com/1194163" }, { "category": "self", "summary": "SUSE Bug 1194967", "url": "https://bugzilla.suse.com/1194967" }, { "category": "self", "summary": "SUSE Bug 1195012", "url": "https://bugzilla.suse.com/1195012" }, { "category": "self", "summary": "SUSE Bug 1195081", "url": "https://bugzilla.suse.com/1195081" }, { "category": "self", "summary": "SUSE Bug 1195286", "url": "https://bugzilla.suse.com/1195286" }, { "category": "self", "summary": "SUSE Bug 1195352", "url": "https://bugzilla.suse.com/1195352" }, { "category": "self", "summary": "SUSE Bug 1195378", "url": "https://bugzilla.suse.com/1195378" }, { "category": "self", "summary": "SUSE Bug 1195506", "url": "https://bugzilla.suse.com/1195506" }, { "category": "self", "summary": "SUSE Bug 1195668", "url": "https://bugzilla.suse.com/1195668" }, { "category": "self", "summary": "SUSE Bug 1195701", "url": "https://bugzilla.suse.com/1195701" }, { "category": "self", "summary": "SUSE Bug 1195798", "url": "https://bugzilla.suse.com/1195798" }, { "category": "self", "summary": "SUSE Bug 1195799", "url": "https://bugzilla.suse.com/1195799" }, { "category": "self", "summary": "SUSE Bug 1195823", "url": "https://bugzilla.suse.com/1195823" }, { "category": "self", "summary": "SUSE Bug 1195928", "url": "https://bugzilla.suse.com/1195928" }, { "category": "self", "summary": "SUSE Bug 1195957", "url": "https://bugzilla.suse.com/1195957" }, { "category": "self", "summary": "SUSE Bug 1195995", "url": "https://bugzilla.suse.com/1195995" }, { "category": "self", "summary": "SUSE Bug 1196195", "url": "https://bugzilla.suse.com/1196195" }, { "category": "self", "summary": "SUSE Bug 1196235", "url": "https://bugzilla.suse.com/1196235" }, { "category": "self", "summary": "SUSE Bug 1196339", "url": "https://bugzilla.suse.com/1196339" }, { "category": "self", "summary": "SUSE Bug 1196400", "url": "https://bugzilla.suse.com/1196400" }, { "category": "self", "summary": "SUSE Bug 1196516", "url": "https://bugzilla.suse.com/1196516" }, { "category": "self", "summary": "SUSE Bug 1196584", "url": "https://bugzilla.suse.com/1196584" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0001 page", "url": "https://www.suse.com/security/cve/CVE-2022-0001/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0002 page", "url": "https://www.suse.com/security/cve/CVE-2022-0002/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0847 page", "url": "https://www.suse.com/security/cve/CVE-2022-0847/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-25375 page", "url": "https://www.suse.com/security/cve/CVE-2022-25375/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2022-03-09T13:37:57Z", "generator": { "date": "2022-03-09T13:37:57Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:0763-1", "initial_release_date": "2022-03-09T13:37:57Z", "revision_history": [ { "date": "2022-03-09T13:37:57Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-rt-5.3.18-150300.79.1.noarch", "product": { "name": "kernel-devel-rt-5.3.18-150300.79.1.noarch", "product_id": "kernel-devel-rt-5.3.18-150300.79.1.noarch" } }, { "category": "product_version", "name": "kernel-source-rt-5.3.18-150300.79.1.noarch", "product": { "name": "kernel-source-rt-5.3.18-150300.79.1.noarch", "product_id": "kernel-source-rt-5.3.18-150300.79.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-rt-5.3.18-150300.79.1.x86_64", "product": { "name": "cluster-md-kmp-rt-5.3.18-150300.79.1.x86_64", "product_id": "cluster-md-kmp-rt-5.3.18-150300.79.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-rt_debug-5.3.18-150300.79.1.x86_64", "product": { "name": "cluster-md-kmp-rt_debug-5.3.18-150300.79.1.x86_64", "product_id": "cluster-md-kmp-rt_debug-5.3.18-150300.79.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt-5.3.18-150300.79.1.x86_64", "product": { "name": "dlm-kmp-rt-5.3.18-150300.79.1.x86_64", "product_id": "dlm-kmp-rt-5.3.18-150300.79.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt_debug-5.3.18-150300.79.1.x86_64", "product": { "name": "dlm-kmp-rt_debug-5.3.18-150300.79.1.x86_64", "product_id": "dlm-kmp-rt_debug-5.3.18-150300.79.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt-5.3.18-150300.79.1.x86_64", "product": { "name": "gfs2-kmp-rt-5.3.18-150300.79.1.x86_64", "product_id": "gfs2-kmp-rt-5.3.18-150300.79.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt_debug-5.3.18-150300.79.1.x86_64", "product": { "name": "gfs2-kmp-rt_debug-5.3.18-150300.79.1.x86_64", "product_id": "gfs2-kmp-rt_debug-5.3.18-150300.79.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-5.3.18-150300.79.1.x86_64", "product": { "name": "kernel-rt-5.3.18-150300.79.1.x86_64", "product_id": "kernel-rt-5.3.18-150300.79.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-5.3.18-150300.79.1.x86_64", "product": { "name": "kernel-rt-devel-5.3.18-150300.79.1.x86_64", "product_id": "kernel-rt-devel-5.3.18-150300.79.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-extra-5.3.18-150300.79.1.x86_64", "product": { "name": "kernel-rt-extra-5.3.18-150300.79.1.x86_64", "product_id": "kernel-rt-extra-5.3.18-150300.79.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-livepatch-devel-5.3.18-150300.79.1.x86_64", "product": { "name": "kernel-rt-livepatch-devel-5.3.18-150300.79.1.x86_64", "product_id": "kernel-rt-livepatch-devel-5.3.18-150300.79.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-optional-5.3.18-150300.79.1.x86_64", "product": { "name": "kernel-rt-optional-5.3.18-150300.79.1.x86_64", "product_id": "kernel-rt-optional-5.3.18-150300.79.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-5.3.18-150300.79.1.x86_64", "product": { "name": "kernel-rt_debug-5.3.18-150300.79.1.x86_64", "product_id": "kernel-rt_debug-5.3.18-150300.79.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-devel-5.3.18-150300.79.1.x86_64", "product": { "name": "kernel-rt_debug-devel-5.3.18-150300.79.1.x86_64", "product_id": "kernel-rt_debug-devel-5.3.18-150300.79.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-extra-5.3.18-150300.79.1.x86_64", "product": { "name": "kernel-rt_debug-extra-5.3.18-150300.79.1.x86_64", "product_id": "kernel-rt_debug-extra-5.3.18-150300.79.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-livepatch-devel-5.3.18-150300.79.1.x86_64", "product": { "name": "kernel-rt_debug-livepatch-devel-5.3.18-150300.79.1.x86_64", "product_id": "kernel-rt_debug-livepatch-devel-5.3.18-150300.79.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-optional-5.3.18-150300.79.1.x86_64", "product": { "name": "kernel-rt_debug-optional-5.3.18-150300.79.1.x86_64", "product_id": "kernel-rt_debug-optional-5.3.18-150300.79.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-5.3.18-150300.79.1.x86_64", "product": { "name": "kernel-syms-rt-5.3.18-150300.79.1.x86_64", "product_id": "kernel-syms-rt-5.3.18-150300.79.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-rt-5.3.18-150300.79.1.x86_64", "product": { "name": "kselftests-kmp-rt-5.3.18-150300.79.1.x86_64", "product_id": "kselftests-kmp-rt-5.3.18-150300.79.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-rt_debug-5.3.18-150300.79.1.x86_64", "product": { "name": "kselftests-kmp-rt_debug-5.3.18-150300.79.1.x86_64", "product_id": "kselftests-kmp-rt_debug-5.3.18-150300.79.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt-5.3.18-150300.79.1.x86_64", "product": { "name": "ocfs2-kmp-rt-5.3.18-150300.79.1.x86_64", "product_id": "ocfs2-kmp-rt-5.3.18-150300.79.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt_debug-5.3.18-150300.79.1.x86_64", "product": { "name": "ocfs2-kmp-rt_debug-5.3.18-150300.79.1.x86_64", "product_id": "ocfs2-kmp-rt_debug-5.3.18-150300.79.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-rt-5.3.18-150300.79.1.x86_64", "product": { "name": "reiserfs-kmp-rt-5.3.18-150300.79.1.x86_64", "product_id": "reiserfs-kmp-rt-5.3.18-150300.79.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-rt_debug-5.3.18-150300.79.1.x86_64", "product": { "name": "reiserfs-kmp-rt_debug-5.3.18-150300.79.1.x86_64", "product_id": "reiserfs-kmp-rt_debug-5.3.18-150300.79.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Real Time Module 15 SP3", "product": { "name": "SUSE Real Time Module 15 SP3", "product_id": "SUSE Real Time Module 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-rt:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.1", "product": { "name": "SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-microos:5.1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-rt-5.3.18-150300.79.1.x86_64 as component of SUSE Real Time Module 15 SP3", "product_id": "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.79.1.x86_64" }, "product_reference": "cluster-md-kmp-rt-5.3.18-150300.79.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-rt-5.3.18-150300.79.1.x86_64 as component of SUSE Real Time Module 15 SP3", "product_id": "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.79.1.x86_64" }, "product_reference": "dlm-kmp-rt-5.3.18-150300.79.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-rt-5.3.18-150300.79.1.x86_64 as component of SUSE Real Time Module 15 SP3", "product_id": "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.79.1.x86_64" }, "product_reference": "gfs2-kmp-rt-5.3.18-150300.79.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-rt-5.3.18-150300.79.1.noarch as component of SUSE Real Time Module 15 SP3", "product_id": "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.79.1.noarch" }, "product_reference": "kernel-devel-rt-5.3.18-150300.79.1.noarch", "relates_to_product_reference": "SUSE Real Time Module 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-5.3.18-150300.79.1.x86_64 as component of SUSE Real Time Module 15 SP3", "product_id": "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.79.1.x86_64" }, "product_reference": "kernel-rt-5.3.18-150300.79.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-5.3.18-150300.79.1.x86_64 as component of SUSE Real Time Module 15 SP3", "product_id": "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.79.1.x86_64" }, "product_reference": "kernel-rt-devel-5.3.18-150300.79.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-devel-5.3.18-150300.79.1.x86_64 as component of SUSE Real Time Module 15 SP3", "product_id": "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.79.1.x86_64" }, "product_reference": "kernel-rt_debug-devel-5.3.18-150300.79.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-5.3.18-150300.79.1.noarch as component of SUSE Real Time Module 15 SP3", "product_id": "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.79.1.noarch" }, "product_reference": "kernel-source-rt-5.3.18-150300.79.1.noarch", "relates_to_product_reference": "SUSE Real Time Module 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-5.3.18-150300.79.1.x86_64 as component of SUSE Real Time Module 15 SP3", "product_id": "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.79.1.x86_64" }, "product_reference": "kernel-syms-rt-5.3.18-150300.79.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-rt-5.3.18-150300.79.1.x86_64 as component of SUSE Real Time Module 15 SP3", "product_id": "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.79.1.x86_64" }, "product_reference": "ocfs2-kmp-rt-5.3.18-150300.79.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-5.3.18-150300.79.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.79.1.x86_64" }, "product_reference": "kernel-rt-5.3.18-150300.79.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-0001", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0001" } ], "notes": [ { "category": "general", "text": "Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.79.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.79.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.79.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0001", "url": "https://www.suse.com/security/cve/CVE-2022-0001" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2022-0001", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2022-0001", "url": "https://bugzilla.suse.com/1196901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.79.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.79.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.79.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.79.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.79.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.79.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T13:37:57Z", "details": "moderate" } ], "title": "CVE-2022-0001" }, { "cve": "CVE-2022-0002", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0002" } ], "notes": [ { "category": "general", "text": "Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.79.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.79.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.79.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0002", "url": "https://www.suse.com/security/cve/CVE-2022-0002" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2022-0002", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2022-0002", "url": "https://bugzilla.suse.com/1196901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.79.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.79.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.79.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.79.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.79.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.79.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T13:37:57Z", "details": "moderate" } ], "title": "CVE-2022-0002" }, { "cve": "CVE-2022-0847", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0847" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way the \"flags\" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.79.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.79.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.79.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0847", "url": "https://www.suse.com/security/cve/CVE-2022-0847" }, { "category": "external", "summary": "SUSE Bug 1196584 for CVE-2022-0847", "url": "https://bugzilla.suse.com/1196584" }, { "category": "external", "summary": "SUSE Bug 1196601 for CVE-2022-0847", "url": "https://bugzilla.suse.com/1196601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.79.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.79.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.79.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.79.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.79.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.79.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T13:37:57Z", "details": "important" } ], "title": "CVE-2022-0847" }, { "cve": "CVE-2022-25375", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-25375" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/usb/gadget/function/rndis.c in the Linux kernel before 5.16.10. The RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command. Attackers can obtain sensitive information from kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.79.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.79.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.79.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-25375", "url": "https://www.suse.com/security/cve/CVE-2022-25375" }, { "category": "external", "summary": "SUSE Bug 1196235 for CVE-2022-25375", "url": "https://bugzilla.suse.com/1196235" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.79.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.79.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.79.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.79.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.79.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.79.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.79.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T13:37:57Z", "details": "moderate" } ], "title": "CVE-2022-25375" } ] }
suse-su-2022:0940-1
Vulnerability from csaf_suse
Published
2022-03-23 09:41
Modified
2022-03-23 09:41
Summary
Security update for xen
Notes
Title of the patch
Security update for xen
Description of the patch
This update for xen fixes the following issues:
Update Xen to version 4.14.4 (bsc#1027519)
Transient execution side-channel attacks attacking the Branch History Buffer (BHB),
named 'Branch Target Injection' and 'Intra-Mode Branch History Injection' are now mitigated.
Security issues fixed:
- CVE-2022-0001, CVE-2022-0002, CVE-2021-26401: BHB speculation issues (bsc#1196915).
Non-security issues fixed:
- Fixed issue around xl and virsh operation - virsh list not giving any output (bsc#1191668).
Patchnames
SUSE-2022-940,SUSE-SLE-Module-Basesystem-15-SP3-2022-940,SUSE-SLE-Module-Server-Applications-15-SP3-2022-940,SUSE-SUSE-MicroOS-5.1-2022-940
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "This update for xen fixes the following issues:\n\nUpdate Xen to version 4.14.4 (bsc#1027519)\n\nTransient execution side-channel attacks attacking the Branch History Buffer (BHB),\nnamed \u0027Branch Target Injection\u0027 and \u0027Intra-Mode Branch History Injection\u0027 are now mitigated.\n\nSecurity issues fixed:\n\n- CVE-2022-0001, CVE-2022-0002, CVE-2021-26401: BHB speculation issues (bsc#1196915).\n\nNon-security issues fixed:\n\n- Fixed issue around xl and virsh operation - virsh list not giving any output (bsc#1191668).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-940,SUSE-SLE-Module-Basesystem-15-SP3-2022-940,SUSE-SLE-Module-Server-Applications-15-SP3-2022-940,SUSE-SUSE-MicroOS-5.1-2022-940", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0940-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:0940-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220940-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:0940-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010504.html" }, { "category": "self", "summary": "SUSE Bug 1027519", "url": "https://bugzilla.suse.com/1027519" }, { "category": "self", "summary": "SUSE Bug 1191668", "url": "https://bugzilla.suse.com/1191668" }, { "category": "self", "summary": "SUSE Bug 1194267", "url": "https://bugzilla.suse.com/1194267" }, { "category": "self", "summary": "SUSE Bug 1196915", "url": "https://bugzilla.suse.com/1196915" }, { "category": "self", "summary": "SUSE CVE CVE-2021-26401 page", "url": "https://www.suse.com/security/cve/CVE-2021-26401/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0001 page", "url": "https://www.suse.com/security/cve/CVE-2022-0001/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0002 page", "url": "https://www.suse.com/security/cve/CVE-2022-0002/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2022-03-23T09:41:23Z", "generator": { "date": "2022-03-23T09:41:23Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:0940-1", "initial_release_date": "2022-03-23T09:41:23Z", "revision_history": [ { "date": "2022-03-23T09:41:23Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-4.14.4_02-150300.3.21.1.aarch64", "product": { "name": "xen-4.14.4_02-150300.3.21.1.aarch64", "product_id": "xen-4.14.4_02-150300.3.21.1.aarch64" } }, { "category": "product_version", "name": "xen-devel-4.14.4_02-150300.3.21.1.aarch64", "product": { "name": "xen-devel-4.14.4_02-150300.3.21.1.aarch64", "product_id": "xen-devel-4.14.4_02-150300.3.21.1.aarch64" } }, { "category": "product_version", "name": "xen-doc-html-4.14.4_02-150300.3.21.1.aarch64", "product": { "name": "xen-doc-html-4.14.4_02-150300.3.21.1.aarch64", "product_id": "xen-doc-html-4.14.4_02-150300.3.21.1.aarch64" } }, { "category": "product_version", "name": "xen-libs-4.14.4_02-150300.3.21.1.aarch64", "product": { "name": "xen-libs-4.14.4_02-150300.3.21.1.aarch64", "product_id": "xen-libs-4.14.4_02-150300.3.21.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-4.14.4_02-150300.3.21.1.aarch64", "product": { "name": "xen-tools-4.14.4_02-150300.3.21.1.aarch64", "product_id": "xen-tools-4.14.4_02-150300.3.21.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-domU-4.14.4_02-150300.3.21.1.aarch64", "product": { "name": "xen-tools-domU-4.14.4_02-150300.3.21.1.aarch64", "product_id": "xen-tools-domU-4.14.4_02-150300.3.21.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "xen-libs-64bit-4.14.4_02-150300.3.21.1.aarch64_ilp32", "product": { "name": "xen-libs-64bit-4.14.4_02-150300.3.21.1.aarch64_ilp32", "product_id": "xen-libs-64bit-4.14.4_02-150300.3.21.1.aarch64_ilp32" } } ], "category": "architecture", "name": "aarch64_ilp32" }, { "branches": [ { "category": "product_version", "name": "xen-devel-4.14.4_02-150300.3.21.1.i586", "product": { "name": "xen-devel-4.14.4_02-150300.3.21.1.i586", "product_id": "xen-devel-4.14.4_02-150300.3.21.1.i586" } }, { "category": "product_version", "name": "xen-libs-4.14.4_02-150300.3.21.1.i586", "product": { "name": "xen-libs-4.14.4_02-150300.3.21.1.i586", "product_id": "xen-libs-4.14.4_02-150300.3.21.1.i586" } }, { "category": "product_version", "name": "xen-tools-domU-4.14.4_02-150300.3.21.1.i586", "product": { "name": "xen-tools-domU-4.14.4_02-150300.3.21.1.i586", "product_id": "xen-tools-domU-4.14.4_02-150300.3.21.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "xen-tools-xendomains-wait-disk-4.14.4_02-150300.3.21.1.noarch", "product": { "name": "xen-tools-xendomains-wait-disk-4.14.4_02-150300.3.21.1.noarch", "product_id": "xen-tools-xendomains-wait-disk-4.14.4_02-150300.3.21.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "xen-4.14.4_02-150300.3.21.1.x86_64", "product": { "name": "xen-4.14.4_02-150300.3.21.1.x86_64", "product_id": "xen-4.14.4_02-150300.3.21.1.x86_64" } }, { "category": "product_version", "name": "xen-devel-4.14.4_02-150300.3.21.1.x86_64", "product": { "name": "xen-devel-4.14.4_02-150300.3.21.1.x86_64", "product_id": "xen-devel-4.14.4_02-150300.3.21.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.14.4_02-150300.3.21.1.x86_64", "product": { "name": "xen-doc-html-4.14.4_02-150300.3.21.1.x86_64", "product_id": "xen-doc-html-4.14.4_02-150300.3.21.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.14.4_02-150300.3.21.1.x86_64", "product": { "name": "xen-libs-4.14.4_02-150300.3.21.1.x86_64", "product_id": "xen-libs-4.14.4_02-150300.3.21.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.14.4_02-150300.3.21.1.x86_64", "product": { "name": "xen-libs-32bit-4.14.4_02-150300.3.21.1.x86_64", "product_id": "xen-libs-32bit-4.14.4_02-150300.3.21.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.14.4_02-150300.3.21.1.x86_64", "product": { "name": "xen-tools-4.14.4_02-150300.3.21.1.x86_64", "product_id": "xen-tools-4.14.4_02-150300.3.21.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.14.4_02-150300.3.21.1.x86_64", "product": { "name": "xen-tools-domU-4.14.4_02-150300.3.21.1.x86_64", "product_id": "xen-tools-domU-4.14.4_02-150300.3.21.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15 SP3", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Server Applications 15 SP3", "product": { "name": "SUSE Linux Enterprise Module for Server Applications 15 SP3", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-server-applications:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.1", "product": { "name": "SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-microos:5.1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.14.4_02-150300.3.21.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:xen-libs-4.14.4_02-150300.3.21.1.x86_64" }, "product_reference": "xen-libs-4.14.4_02-150300.3.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.14.4_02-150300.3.21.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:xen-tools-domU-4.14.4_02-150300.3.21.1.x86_64" }, "product_reference": "xen-tools-domU-4.14.4_02-150300.3.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.14.4_02-150300.3.21.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP3", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP3:xen-4.14.4_02-150300.3.21.1.x86_64" }, "product_reference": "xen-4.14.4_02-150300.3.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.14.4_02-150300.3.21.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP3", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP3:xen-devel-4.14.4_02-150300.3.21.1.x86_64" }, "product_reference": "xen-devel-4.14.4_02-150300.3.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.14.4_02-150300.3.21.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP3", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP3:xen-tools-4.14.4_02-150300.3.21.1.x86_64" }, "product_reference": "xen-tools-4.14.4_02-150300.3.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.14.4_02-150300.3.21.1.noarch as component of SUSE Linux Enterprise Module for Server Applications 15 SP3", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP3:xen-tools-xendomains-wait-disk-4.14.4_02-150300.3.21.1.noarch" }, "product_reference": "xen-tools-xendomains-wait-disk-4.14.4_02-150300.3.21.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.14.4_02-150300.3.21.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:xen-libs-4.14.4_02-150300.3.21.1.x86_64" }, "product_reference": "xen-libs-4.14.4_02-150300.3.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-26401", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-26401" } ], "notes": [ { "category": "general", "text": "LFENCE/JMP (mitigation V2-2) may not sufficiently mitigate CVE-2017-5715 on some AMD CPUs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:xen-libs-4.14.4_02-150300.3.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:xen-libs-4.14.4_02-150300.3.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:xen-tools-domU-4.14.4_02-150300.3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:xen-4.14.4_02-150300.3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:xen-devel-4.14.4_02-150300.3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:xen-tools-4.14.4_02-150300.3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:xen-tools-xendomains-wait-disk-4.14.4_02-150300.3.21.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-26401", "url": "https://www.suse.com/security/cve/CVE-2021-26401" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2021-26401", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2021-26401", "url": "https://bugzilla.suse.com/1196901" }, { "category": "external", "summary": "SUSE Bug 1209630 for CVE-2021-26401", "url": "https://bugzilla.suse.com/1209630" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:xen-libs-4.14.4_02-150300.3.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:xen-libs-4.14.4_02-150300.3.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:xen-tools-domU-4.14.4_02-150300.3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:xen-4.14.4_02-150300.3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:xen-devel-4.14.4_02-150300.3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:xen-tools-4.14.4_02-150300.3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:xen-tools-xendomains-wait-disk-4.14.4_02-150300.3.21.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:xen-libs-4.14.4_02-150300.3.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:xen-libs-4.14.4_02-150300.3.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:xen-tools-domU-4.14.4_02-150300.3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:xen-4.14.4_02-150300.3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:xen-devel-4.14.4_02-150300.3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:xen-tools-4.14.4_02-150300.3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:xen-tools-xendomains-wait-disk-4.14.4_02-150300.3.21.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2022-03-23T09:41:23Z", "details": "moderate" } ], "title": "CVE-2021-26401" }, { "cve": "CVE-2022-0001", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0001" } ], "notes": [ { "category": "general", "text": "Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:xen-libs-4.14.4_02-150300.3.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:xen-libs-4.14.4_02-150300.3.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:xen-tools-domU-4.14.4_02-150300.3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:xen-4.14.4_02-150300.3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:xen-devel-4.14.4_02-150300.3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:xen-tools-4.14.4_02-150300.3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:xen-tools-xendomains-wait-disk-4.14.4_02-150300.3.21.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0001", "url": "https://www.suse.com/security/cve/CVE-2022-0001" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2022-0001", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2022-0001", "url": "https://bugzilla.suse.com/1196901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:xen-libs-4.14.4_02-150300.3.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:xen-libs-4.14.4_02-150300.3.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:xen-tools-domU-4.14.4_02-150300.3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:xen-4.14.4_02-150300.3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:xen-devel-4.14.4_02-150300.3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:xen-tools-4.14.4_02-150300.3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:xen-tools-xendomains-wait-disk-4.14.4_02-150300.3.21.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:xen-libs-4.14.4_02-150300.3.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:xen-libs-4.14.4_02-150300.3.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:xen-tools-domU-4.14.4_02-150300.3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:xen-4.14.4_02-150300.3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:xen-devel-4.14.4_02-150300.3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:xen-tools-4.14.4_02-150300.3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:xen-tools-xendomains-wait-disk-4.14.4_02-150300.3.21.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2022-03-23T09:41:23Z", "details": "moderate" } ], "title": "CVE-2022-0001" }, { "cve": "CVE-2022-0002", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0002" } ], "notes": [ { "category": "general", "text": "Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:xen-libs-4.14.4_02-150300.3.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:xen-libs-4.14.4_02-150300.3.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:xen-tools-domU-4.14.4_02-150300.3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:xen-4.14.4_02-150300.3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:xen-devel-4.14.4_02-150300.3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:xen-tools-4.14.4_02-150300.3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:xen-tools-xendomains-wait-disk-4.14.4_02-150300.3.21.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0002", "url": "https://www.suse.com/security/cve/CVE-2022-0002" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2022-0002", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2022-0002", "url": "https://bugzilla.suse.com/1196901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:xen-libs-4.14.4_02-150300.3.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:xen-libs-4.14.4_02-150300.3.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:xen-tools-domU-4.14.4_02-150300.3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:xen-4.14.4_02-150300.3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:xen-devel-4.14.4_02-150300.3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:xen-tools-4.14.4_02-150300.3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:xen-tools-xendomains-wait-disk-4.14.4_02-150300.3.21.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:xen-libs-4.14.4_02-150300.3.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:xen-libs-4.14.4_02-150300.3.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:xen-tools-domU-4.14.4_02-150300.3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:xen-4.14.4_02-150300.3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:xen-devel-4.14.4_02-150300.3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:xen-tools-4.14.4_02-150300.3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP3:xen-tools-xendomains-wait-disk-4.14.4_02-150300.3.21.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2022-03-23T09:41:23Z", "details": "moderate" } ], "title": "CVE-2022-0002" } ] }
suse-su-2022:0766-1
Vulnerability from csaf_suse
Published
2022-03-09 10:36
Modified
2022-03-09 10:36
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 kernel was updated to receive various security and bugfixes.
Transient execution side-channel attacks attacking the Branch History Buffer (BHB),
named 'Branch Target Injection' and 'Intra-Mode Branch History Injection' are now mitigated.
The following security bugs were fixed:
- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).
- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).
- CVE-2022-0847: Fixed a vulnerability were a local attackers could overwrite data in arbitrary (read-only) files (bsc#1196584).
- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)
- CVE-2022-0644: Fixed a denial of service by a local user. A assertion failure could be triggered in kernel_read_file_from_fd() (bsc#1196155).
- CVE-2021-44879: In gc_data_segment() in fs/f2fs/gc.c, special files were not considered, which lead to a move_data_page NULL pointer dereference (bsc#1195987).
- CVE-2022-24959: Fixed a memory leak in yam_siocdevprivate() in drivers/net/hamradio/yam.c (bsc#1195897).
- CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).
- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
- CVE-2022-24448: Fixed an issue in fs/nfs/dir.c. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).
The following non-security bugs were fixed:
- crypto: af_alg - get_page upon reassignment to TX SGL (bsc#1195840).
- hv_netvsc: fix network namespace issues with VF support (bsc#1107207).
- hv_netvsc: move VF to same namespace as netvsc device (bsc#1107207).
- lib/iov_iter: initialize 'flags' in new pipe_buffer (bsc#1196584).
Patchnames
SUSE-2022-766,SUSE-SLE-Module-Live-Patching-15-2022-766,SUSE-SLE-Product-HA-15-2022-766,SUSE-SLE-Product-HPC-15-2022-766,SUSE-SLE-Product-SLES-15-2022-766,SUSE-SLE-Product-SLES_SAP-15-2022-766
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 15 kernel was updated to receive various security and bugfixes.\n\n\nTransient execution side-channel attacks attacking the Branch History Buffer (BHB),\nnamed \u0027Branch Target Injection\u0027 and \u0027Intra-Mode Branch History Injection\u0027 are now mitigated.\n\nThe following security bugs were fixed:\n\n- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).\n- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).\n- CVE-2022-0847: Fixed a vulnerability were a local attackers could overwrite data in arbitrary (read-only) files (bsc#1196584).\n- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)\n- CVE-2022-0644: Fixed a denial of service by a local user. A assertion failure could be triggered in kernel_read_file_from_fd() (bsc#1196155).\n- CVE-2021-44879: In gc_data_segment() in fs/f2fs/gc.c, special files were not considered, which lead to a move_data_page NULL pointer dereference (bsc#1195987).\n- CVE-2022-24959: Fixed a memory leak in yam_siocdevprivate() in drivers/net/hamradio/yam.c (bsc#1195897).\n- CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).\n- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).\n- CVE-2022-24448: Fixed an issue in fs/nfs/dir.c. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).\n\nThe following non-security bugs were fixed:\n\n- crypto: af_alg - get_page upon reassignment to TX SGL (bsc#1195840).\n- hv_netvsc: fix network namespace issues with VF support (bsc#1107207).\n- hv_netvsc: move VF to same namespace as netvsc device (bsc#1107207).\n- lib/iov_iter: initialize \u0027flags\u0027 in new pipe_buffer (bsc#1196584).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-766,SUSE-SLE-Module-Live-Patching-15-2022-766,SUSE-SLE-Product-HA-15-2022-766,SUSE-SLE-Product-HPC-15-2022-766,SUSE-SLE-Product-SLES-15-2022-766,SUSE-SLE-Product-SLES_SAP-15-2022-766", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0766-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:0766-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220766-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:0766-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010394.html" }, { "category": "self", "summary": "SUSE Bug 1107207", "url": "https://bugzilla.suse.com/1107207" }, { "category": "self", "summary": "SUSE Bug 1185973", "url": "https://bugzilla.suse.com/1185973" }, { "category": "self", "summary": "SUSE Bug 1191580", "url": "https://bugzilla.suse.com/1191580" }, { "category": "self", "summary": "SUSE Bug 1194516", "url": "https://bugzilla.suse.com/1194516" }, { "category": "self", "summary": "SUSE Bug 1195536", "url": "https://bugzilla.suse.com/1195536" }, { "category": "self", "summary": "SUSE Bug 1195543", "url": "https://bugzilla.suse.com/1195543" }, { "category": "self", "summary": "SUSE Bug 1195612", "url": "https://bugzilla.suse.com/1195612" }, { "category": "self", "summary": "SUSE Bug 1195840", "url": "https://bugzilla.suse.com/1195840" }, { "category": "self", "summary": "SUSE Bug 1195897", "url": "https://bugzilla.suse.com/1195897" }, { "category": "self", "summary": "SUSE Bug 1195908", "url": "https://bugzilla.suse.com/1195908" }, { "category": "self", "summary": "SUSE Bug 1195949", "url": "https://bugzilla.suse.com/1195949" }, { "category": "self", "summary": "SUSE Bug 1195987", "url": "https://bugzilla.suse.com/1195987" }, { "category": "self", "summary": "SUSE Bug 1196079", "url": "https://bugzilla.suse.com/1196079" }, { "category": "self", "summary": "SUSE Bug 1196155", "url": "https://bugzilla.suse.com/1196155" }, { "category": "self", "summary": "SUSE Bug 1196584", "url": "https://bugzilla.suse.com/1196584" }, { "category": "self", "summary": "SUSE Bug 1196612", "url": "https://bugzilla.suse.com/1196612" }, { "category": "self", "summary": "SUSE CVE CVE-2021-44879 page", "url": "https://www.suse.com/security/cve/CVE-2021-44879/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0001 page", "url": "https://www.suse.com/security/cve/CVE-2022-0001/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0002 page", "url": "https://www.suse.com/security/cve/CVE-2022-0002/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0487 page", "url": "https://www.suse.com/security/cve/CVE-2022-0487/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0492 page", "url": "https://www.suse.com/security/cve/CVE-2022-0492/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0617 page", "url": "https://www.suse.com/security/cve/CVE-2022-0617/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0644 page", "url": "https://www.suse.com/security/cve/CVE-2022-0644/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0847 page", "url": "https://www.suse.com/security/cve/CVE-2022-0847/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-24448 page", "url": "https://www.suse.com/security/cve/CVE-2022-24448/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-24959 page", "url": "https://www.suse.com/security/cve/CVE-2022-24959/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2022-03-09T10:36:15Z", "generator": { "date": "2022-03-09T10:36:15Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:0766-1", "initial_release_date": "2022-03-09T10:36:15Z", "revision_history": [ { "date": "2022-03-09T10:36:15Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-150.86.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.12.14-150.86.1.aarch64", "product_id": "cluster-md-kmp-default-4.12.14-150.86.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-150.86.1.aarch64", "product": { "name": "dlm-kmp-default-4.12.14-150.86.1.aarch64", "product_id": "dlm-kmp-default-4.12.14-150.86.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-150.86.1.aarch64", "product": { "name": "gfs2-kmp-default-4.12.14-150.86.1.aarch64", "product_id": "gfs2-kmp-default-4.12.14-150.86.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-150.86.1.aarch64", "product": { "name": "kernel-default-4.12.14-150.86.1.aarch64", "product_id": "kernel-default-4.12.14-150.86.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-150.86.1.aarch64", "product": { "name": "kernel-default-base-4.12.14-150.86.1.aarch64", "product_id": "kernel-default-base-4.12.14-150.86.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-150.86.1.aarch64", "product": { "name": "kernel-default-devel-4.12.14-150.86.1.aarch64", "product_id": "kernel-default-devel-4.12.14-150.86.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-150.86.1.aarch64", "product": { "name": "kernel-default-extra-4.12.14-150.86.1.aarch64", "product_id": "kernel-default-extra-4.12.14-150.86.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-150.86.1.aarch64", "product": { "name": "kernel-default-livepatch-4.12.14-150.86.1.aarch64", "product_id": "kernel-default-livepatch-4.12.14-150.86.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-150.86.1.aarch64", "product": { "name": "kernel-default-livepatch-devel-4.12.14-150.86.1.aarch64", "product_id": "kernel-default-livepatch-devel-4.12.14-150.86.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-150.86.1.aarch64", "product": { "name": "kernel-obs-build-4.12.14-150.86.1.aarch64", "product_id": "kernel-obs-build-4.12.14-150.86.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-150.86.1.aarch64", "product": { "name": "kernel-obs-qa-4.12.14-150.86.1.aarch64", "product_id": "kernel-obs-qa-4.12.14-150.86.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-150.86.1.aarch64", "product": { "name": "kernel-syms-4.12.14-150.86.1.aarch64", "product_id": "kernel-syms-4.12.14-150.86.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-150.86.1.aarch64", "product": { "name": "kernel-vanilla-4.12.14-150.86.1.aarch64", "product_id": "kernel-vanilla-4.12.14-150.86.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-150.86.1.aarch64", "product": { "name": "kernel-vanilla-base-4.12.14-150.86.1.aarch64", "product_id": "kernel-vanilla-base-4.12.14-150.86.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-150.86.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.12.14-150.86.1.aarch64", "product_id": "kernel-vanilla-devel-4.12.14-150.86.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-150.86.1.aarch64", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-150.86.1.aarch64", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.86.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-150.86.1.aarch64", "product": { "name": "kselftests-kmp-default-4.12.14-150.86.1.aarch64", "product_id": "kselftests-kmp-default-4.12.14-150.86.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-150.86.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.12.14-150.86.1.aarch64", "product_id": "ocfs2-kmp-default-4.12.14-150.86.1.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-150.86.1.aarch64", "product": { "name": "reiserfs-kmp-default-4.12.14-150.86.1.aarch64", "product_id": "reiserfs-kmp-default-4.12.14-150.86.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-150.86.1.noarch", "product": { "name": "kernel-devel-4.12.14-150.86.1.noarch", "product_id": "kernel-devel-4.12.14-150.86.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-150.86.1.noarch", "product": { "name": "kernel-docs-4.12.14-150.86.1.noarch", "product_id": "kernel-docs-4.12.14-150.86.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-150.86.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-150.86.1.noarch", "product_id": "kernel-docs-html-4.12.14-150.86.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-150.86.1.noarch", "product": { "name": "kernel-macros-4.12.14-150.86.1.noarch", "product_id": "kernel-macros-4.12.14-150.86.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-150.86.1.noarch", "product": { "name": "kernel-source-4.12.14-150.86.1.noarch", "product_id": "kernel-source-4.12.14-150.86.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-150.86.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-150.86.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-150.86.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-150.86.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.12.14-150.86.1.ppc64le", "product_id": "cluster-md-kmp-default-4.12.14-150.86.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-150.86.1.ppc64le", "product": { "name": "dlm-kmp-default-4.12.14-150.86.1.ppc64le", "product_id": "dlm-kmp-default-4.12.14-150.86.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-150.86.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.12.14-150.86.1.ppc64le", "product_id": "gfs2-kmp-default-4.12.14-150.86.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-150.86.1.ppc64le", "product": { "name": "kernel-debug-4.12.14-150.86.1.ppc64le", "product_id": "kernel-debug-4.12.14-150.86.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-150.86.1.ppc64le", "product": { "name": "kernel-debug-base-4.12.14-150.86.1.ppc64le", "product_id": "kernel-debug-base-4.12.14-150.86.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-150.86.1.ppc64le", "product": { "name": "kernel-debug-devel-4.12.14-150.86.1.ppc64le", "product_id": "kernel-debug-devel-4.12.14-150.86.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-4.12.14-150.86.1.ppc64le", "product": { "name": "kernel-debug-livepatch-devel-4.12.14-150.86.1.ppc64le", "product_id": "kernel-debug-livepatch-devel-4.12.14-150.86.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.12.14-150.86.1.ppc64le", "product": { "name": "kernel-default-4.12.14-150.86.1.ppc64le", "product_id": "kernel-default-4.12.14-150.86.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-150.86.1.ppc64le", "product": { "name": "kernel-default-base-4.12.14-150.86.1.ppc64le", "product_id": "kernel-default-base-4.12.14-150.86.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-150.86.1.ppc64le", "product": { "name": "kernel-default-devel-4.12.14-150.86.1.ppc64le", "product_id": "kernel-default-devel-4.12.14-150.86.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-150.86.1.ppc64le", "product": { "name": "kernel-default-extra-4.12.14-150.86.1.ppc64le", "product_id": "kernel-default-extra-4.12.14-150.86.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-150.86.1.ppc64le", "product": { "name": "kernel-default-livepatch-4.12.14-150.86.1.ppc64le", "product_id": "kernel-default-livepatch-4.12.14-150.86.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-150.86.1.ppc64le", "product": { "name": "kernel-default-livepatch-devel-4.12.14-150.86.1.ppc64le", "product_id": "kernel-default-livepatch-devel-4.12.14-150.86.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_86-default-1-1.3.1.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-150_86-default-1-1.3.1.ppc64le", "product_id": "kernel-livepatch-4_12_14-150_86-default-1-1.3.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-150.86.1.ppc64le", "product": { "name": "kernel-obs-build-4.12.14-150.86.1.ppc64le", "product_id": "kernel-obs-build-4.12.14-150.86.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-150.86.1.ppc64le", "product": { "name": "kernel-obs-qa-4.12.14-150.86.1.ppc64le", "product_id": "kernel-obs-qa-4.12.14-150.86.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-150.86.1.ppc64le", "product": { "name": "kernel-syms-4.12.14-150.86.1.ppc64le", "product_id": "kernel-syms-4.12.14-150.86.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-150.86.1.ppc64le", "product": { "name": "kernel-vanilla-4.12.14-150.86.1.ppc64le", "product_id": "kernel-vanilla-4.12.14-150.86.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "product_id": "kernel-vanilla-base-4.12.14-150.86.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-150.86.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.12.14-150.86.1.ppc64le", "product_id": "kernel-vanilla-devel-4.12.14-150.86.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-150.86.1.ppc64le", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-150.86.1.ppc64le", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.86.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-150.86.1.ppc64le", "product": { "name": "kselftests-kmp-default-4.12.14-150.86.1.ppc64le", "product_id": "kselftests-kmp-default-4.12.14-150.86.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-150.86.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.12.14-150.86.1.ppc64le", "product_id": "ocfs2-kmp-default-4.12.14-150.86.1.ppc64le" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "product": { "name": "reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "product_id": "reiserfs-kmp-default-4.12.14-150.86.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-150.86.1.s390x", "product": { "name": "cluster-md-kmp-default-4.12.14-150.86.1.s390x", "product_id": "cluster-md-kmp-default-4.12.14-150.86.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-150.86.1.s390x", "product": { "name": "dlm-kmp-default-4.12.14-150.86.1.s390x", "product_id": "dlm-kmp-default-4.12.14-150.86.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-150.86.1.s390x", "product": { "name": "gfs2-kmp-default-4.12.14-150.86.1.s390x", "product_id": "gfs2-kmp-default-4.12.14-150.86.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.12.14-150.86.1.s390x", "product": { "name": "kernel-default-4.12.14-150.86.1.s390x", "product_id": "kernel-default-4.12.14-150.86.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-150.86.1.s390x", "product": { "name": "kernel-default-base-4.12.14-150.86.1.s390x", "product_id": "kernel-default-base-4.12.14-150.86.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-150.86.1.s390x", "product": { "name": "kernel-default-devel-4.12.14-150.86.1.s390x", "product_id": "kernel-default-devel-4.12.14-150.86.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-150.86.1.s390x", "product": { "name": "kernel-default-extra-4.12.14-150.86.1.s390x", "product_id": "kernel-default-extra-4.12.14-150.86.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-150.86.1.s390x", "product": { "name": "kernel-default-livepatch-4.12.14-150.86.1.s390x", "product_id": "kernel-default-livepatch-4.12.14-150.86.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-150.86.1.s390x", "product": { "name": "kernel-default-livepatch-devel-4.12.14-150.86.1.s390x", "product_id": "kernel-default-livepatch-devel-4.12.14-150.86.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.12.14-150.86.1.s390x", "product": { "name": "kernel-default-man-4.12.14-150.86.1.s390x", "product_id": "kernel-default-man-4.12.14-150.86.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-150.86.1.s390x", "product": { "name": "kernel-obs-build-4.12.14-150.86.1.s390x", "product_id": "kernel-obs-build-4.12.14-150.86.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-150.86.1.s390x", "product": { "name": "kernel-obs-qa-4.12.14-150.86.1.s390x", "product_id": "kernel-obs-qa-4.12.14-150.86.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-150.86.1.s390x", "product": { "name": "kernel-syms-4.12.14-150.86.1.s390x", "product_id": "kernel-syms-4.12.14-150.86.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-150.86.1.s390x", "product": { "name": "kernel-vanilla-4.12.14-150.86.1.s390x", "product_id": "kernel-vanilla-4.12.14-150.86.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-150.86.1.s390x", "product": { "name": "kernel-vanilla-base-4.12.14-150.86.1.s390x", "product_id": "kernel-vanilla-base-4.12.14-150.86.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-150.86.1.s390x", "product": { "name": "kernel-vanilla-devel-4.12.14-150.86.1.s390x", "product_id": "kernel-vanilla-devel-4.12.14-150.86.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-150.86.1.s390x", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-150.86.1.s390x", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.86.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.12.14-150.86.1.s390x", "product": { "name": "kernel-zfcpdump-4.12.14-150.86.1.s390x", "product_id": "kernel-zfcpdump-4.12.14-150.86.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-man-4.12.14-150.86.1.s390x", "product": { "name": "kernel-zfcpdump-man-4.12.14-150.86.1.s390x", "product_id": "kernel-zfcpdump-man-4.12.14-150.86.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-150.86.1.s390x", "product": { "name": "kselftests-kmp-default-4.12.14-150.86.1.s390x", "product_id": "kselftests-kmp-default-4.12.14-150.86.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-150.86.1.s390x", "product": { "name": "ocfs2-kmp-default-4.12.14-150.86.1.s390x", "product_id": "ocfs2-kmp-default-4.12.14-150.86.1.s390x" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-150.86.1.s390x", "product": { "name": "reiserfs-kmp-default-4.12.14-150.86.1.s390x", "product_id": "reiserfs-kmp-default-4.12.14-150.86.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-150.86.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.12.14-150.86.1.x86_64", "product_id": "cluster-md-kmp-default-4.12.14-150.86.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-150.86.1.x86_64", "product": { "name": "dlm-kmp-default-4.12.14-150.86.1.x86_64", "product_id": "dlm-kmp-default-4.12.14-150.86.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-150.86.1.x86_64", "product": { "name": "gfs2-kmp-default-4.12.14-150.86.1.x86_64", "product_id": "gfs2-kmp-default-4.12.14-150.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-150.86.1.x86_64", "product": { "name": "kernel-debug-4.12.14-150.86.1.x86_64", "product_id": "kernel-debug-4.12.14-150.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-150.86.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-150.86.1.x86_64", "product_id": "kernel-debug-base-4.12.14-150.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-150.86.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-150.86.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-150.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-4.12.14-150.86.1.x86_64", "product": { "name": "kernel-debug-livepatch-devel-4.12.14-150.86.1.x86_64", "product_id": "kernel-debug-livepatch-devel-4.12.14-150.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-150.86.1.x86_64", "product": { "name": "kernel-default-4.12.14-150.86.1.x86_64", "product_id": "kernel-default-4.12.14-150.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-150.86.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-150.86.1.x86_64", "product_id": "kernel-default-base-4.12.14-150.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-150.86.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-150.86.1.x86_64", "product_id": "kernel-default-devel-4.12.14-150.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-150.86.1.x86_64", "product": { "name": "kernel-default-extra-4.12.14-150.86.1.x86_64", "product_id": "kernel-default-extra-4.12.14-150.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-150.86.1.x86_64", "product": { "name": "kernel-default-livepatch-4.12.14-150.86.1.x86_64", "product_id": "kernel-default-livepatch-4.12.14-150.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-150.86.1.x86_64", "product": { "name": "kernel-default-livepatch-devel-4.12.14-150.86.1.x86_64", "product_id": "kernel-default-livepatch-devel-4.12.14-150.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-150.86.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-150.86.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-150.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-150.86.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-150.86.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-150.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-150.86.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-150.86.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-150.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-livepatch-devel-4.12.14-150.86.1.x86_64", "product": { "name": "kernel-kvmsmall-livepatch-devel-4.12.14-150.86.1.x86_64", "product_id": "kernel-kvmsmall-livepatch-devel-4.12.14-150.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_86-default-1-1.3.1.x86_64", "product": { "name": "kernel-livepatch-4_12_14-150_86-default-1-1.3.1.x86_64", "product_id": "kernel-livepatch-4_12_14-150_86-default-1-1.3.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-150.86.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-150.86.1.x86_64", "product_id": "kernel-obs-build-4.12.14-150.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-150.86.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-150.86.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-150.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-150.86.1.x86_64", "product": { "name": "kernel-syms-4.12.14-150.86.1.x86_64", "product_id": "kernel-syms-4.12.14-150.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-150.86.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-150.86.1.x86_64", "product_id": "kernel-vanilla-4.12.14-150.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-150.86.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-150.86.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-150.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-150.86.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-150.86.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-150.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-150.86.1.x86_64", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-150.86.1.x86_64", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.86.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-150.86.1.x86_64", "product": { "name": "kselftests-kmp-default-4.12.14-150.86.1.x86_64", "product_id": "kselftests-kmp-default-4.12.14-150.86.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-150.86.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.12.14-150.86.1.x86_64", "product_id": "ocfs2-kmp-default-4.12.14-150.86.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-150.86.1.x86_64", "product": { "name": "reiserfs-kmp-default-4.12.14-150.86.1.x86_64", "product_id": "reiserfs-kmp-default-4.12.14-150.86.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15", "product": { "name": "SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 15", "product": { "name": "SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-4.12.14-150.86.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.ppc64le" }, "product_reference": "kernel-default-livepatch-4.12.14-150.86.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-4.12.14-150.86.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.x86_64" }, "product_reference": "kernel-default-livepatch-4.12.14-150.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_86-default-1-1.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_86-default-1-1.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_86-default-1-1.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_86-default-1-1.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-150.86.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.aarch64" }, "product_reference": "cluster-md-kmp-default-4.12.14-150.86.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-150.86.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.12.14-150.86.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-150.86.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.12.14-150.86.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-150.86.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.12.14-150.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-150.86.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.aarch64" }, "product_reference": "dlm-kmp-default-4.12.14-150.86.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-150.86.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.12.14-150.86.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-150.86.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.s390x" }, "product_reference": "dlm-kmp-default-4.12.14-150.86.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-150.86.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.x86_64" }, "product_reference": "dlm-kmp-default-4.12.14-150.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-150.86.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.aarch64" }, "product_reference": "gfs2-kmp-default-4.12.14-150.86.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-150.86.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.12.14-150.86.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-150.86.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.s390x" }, "product_reference": "gfs2-kmp-default-4.12.14-150.86.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-150.86.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.12.14-150.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-150.86.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.aarch64" }, "product_reference": "ocfs2-kmp-default-4.12.14-150.86.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-150.86.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.12.14-150.86.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-150.86.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.12.14-150.86.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-150.86.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.12.14-150.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.86.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.aarch64" }, "product_reference": "kernel-default-4.12.14-150.86.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.86.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.x86_64" }, "product_reference": "kernel-default-4.12.14-150.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.86.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-150.86.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.86.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-150.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.86.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-150.86.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.86.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-150.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-150.86.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.86.1.noarch" }, "product_reference": "kernel-devel-4.12.14-150.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-150.86.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.86.1.noarch" }, "product_reference": "kernel-docs-4.12.14-150.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-150.86.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.86.1.noarch" }, "product_reference": "kernel-macros-4.12.14-150.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.86.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-150.86.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.86.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-150.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-150.86.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.86.1.noarch" }, "product_reference": "kernel-source-4.12.14-150.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.86.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-150.86.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.86.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-150.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.86.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.aarch64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.86.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.86.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.x86_64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.86.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64" }, "product_reference": "kernel-default-4.12.14-150.86.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.86.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64" }, "product_reference": "kernel-default-4.12.14-150.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.86.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-150.86.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.86.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-150.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.86.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-150.86.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.86.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-150.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-150.86.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch" }, "product_reference": "kernel-devel-4.12.14-150.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-150.86.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch" }, "product_reference": "kernel-docs-4.12.14-150.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-150.86.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch" }, "product_reference": "kernel-macros-4.12.14-150.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.86.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-150.86.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.86.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-150.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-150.86.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.86.1.noarch" }, "product_reference": "kernel-source-4.12.14-150.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.86.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-150.86.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.86.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-150.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.86.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.86.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.86.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.86.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64" }, "product_reference": "kernel-default-4.12.14-150.86.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.86.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-150.86.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.86.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.s390x" }, "product_reference": "kernel-default-4.12.14-150.86.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.86.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64" }, "product_reference": "kernel-default-4.12.14-150.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.86.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-150.86.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.86.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-150.86.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.86.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-150.86.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.86.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-150.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.86.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-150.86.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.86.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-150.86.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.86.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-150.86.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.86.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-150.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-150.86.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.86.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-150.86.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-150.86.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch" }, "product_reference": "kernel-devel-4.12.14-150.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-150.86.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch" }, "product_reference": "kernel-docs-4.12.14-150.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-150.86.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch" }, "product_reference": "kernel-macros-4.12.14-150.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.86.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-150.86.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.86.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.ppc64le" }, "product_reference": "kernel-obs-build-4.12.14-150.86.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.86.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.s390x" }, "product_reference": "kernel-obs-build-4.12.14-150.86.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.86.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-150.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-150.86.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.86.1.noarch" }, "product_reference": "kernel-source-4.12.14-150.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.86.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-150.86.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.86.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-150.86.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.86.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.s390x" }, "product_reference": "kernel-syms-4.12.14-150.86.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.86.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-150.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.86.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.86.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.86.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.ppc64le" }, "product_reference": "kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.86.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.s390x" }, "product_reference": "kernel-vanilla-base-4.12.14-150.86.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.86.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.86.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.aarch64" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.86.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.86.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.86.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.s390x" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.86.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.86.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.x86_64" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.86.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-150.86.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.86.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.x86_64" }, "product_reference": "kernel-default-4.12.14-150.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.86.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-150.86.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.86.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-150.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.86.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-150.86.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.86.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-150.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-150.86.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.86.1.noarch" }, "product_reference": "kernel-devel-4.12.14-150.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-150.86.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.86.1.noarch" }, "product_reference": "kernel-docs-4.12.14-150.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-150.86.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.86.1.noarch" }, "product_reference": "kernel-macros-4.12.14-150.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.86.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.ppc64le" }, "product_reference": "kernel-obs-build-4.12.14-150.86.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.86.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-150.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-150.86.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.86.1.noarch" }, "product_reference": "kernel-source-4.12.14-150.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.86.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-150.86.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.86.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-150.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.86.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.ppc64le" }, "product_reference": "kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.86.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.x86_64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.86.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.86.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.x86_64" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-44879", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-44879" } ], "notes": [ { "category": "general", "text": "In gc_data_segment in fs/f2fs/gc.c in the Linux kernel before 5.16.3, special files are not considered, leading to a move_data_page NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-44879", "url": "https://www.suse.com/security/cve/CVE-2021-44879" }, { "category": "external", "summary": "SUSE Bug 1195987 for CVE-2021-44879", "url": "https://bugzilla.suse.com/1195987" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T10:36:15Z", "details": "moderate" } ], "title": "CVE-2021-44879" }, { "cve": "CVE-2022-0001", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0001" } ], "notes": [ { "category": "general", "text": "Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0001", "url": "https://www.suse.com/security/cve/CVE-2022-0001" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2022-0001", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2022-0001", "url": "https://bugzilla.suse.com/1196901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T10:36:15Z", "details": "moderate" } ], "title": "CVE-2022-0001" }, { "cve": "CVE-2022-0002", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0002" } ], "notes": [ { "category": "general", "text": "Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0002", "url": "https://www.suse.com/security/cve/CVE-2022-0002" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2022-0002", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2022-0002", "url": "https://bugzilla.suse.com/1196901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T10:36:15Z", "details": "moderate" } ], "title": "CVE-2022-0002" }, { "cve": "CVE-2022-0487", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0487" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove in drivers/memstick/host/rtsx_usb_ms.c in memstick in the Linux kernel. In this flaw, a local attacker with a user privilege may impact system Confidentiality. This flaw affects kernel versions prior to 5.14 rc1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0487", "url": "https://www.suse.com/security/cve/CVE-2022-0487" }, { "category": "external", "summary": "SUSE Bug 1194516 for CVE-2022-0487", "url": "https://bugzilla.suse.com/1194516" }, { "category": "external", "summary": "SUSE Bug 1195949 for CVE-2022-0487", "url": "https://bugzilla.suse.com/1195949" }, { "category": "external", "summary": "SUSE Bug 1198615 for CVE-2022-0487", "url": "https://bugzilla.suse.com/1198615" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T10:36:15Z", "details": "moderate" } ], "title": "CVE-2022-0487" }, { "cve": "CVE-2022-0492", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0492" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in the Linux kernel\u0027s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0492", "url": "https://www.suse.com/security/cve/CVE-2022-0492" }, { "category": "external", "summary": "SUSE Bug 1195543 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1195543" }, { "category": "external", "summary": "SUSE Bug 1195908 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1195908" }, { "category": "external", "summary": "SUSE Bug 1196612 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1196612" }, { "category": "external", "summary": "SUSE Bug 1196776 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1196776" }, { "category": "external", "summary": "SUSE Bug 1198615 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1198615" }, { "category": "external", "summary": "SUSE Bug 1199255 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1199255" }, { "category": "external", "summary": "SUSE Bug 1199615 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1199615" }, { "category": "external", "summary": "SUSE Bug 1200084 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1200084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T10:36:15Z", "details": "moderate" } ], "title": "CVE-2022-0492" }, { "cve": "CVE-2022-0617", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0617" } ], "notes": [ { "category": "general", "text": "A flaw null pointer dereference in the Linux kernel UDF file system functionality was found in the way user triggers udf_file_write_iter function for the malicious UDF image. A local user could use this flaw to crash the system. Actual from Linux kernel 4.2-rc1 till 5.17-rc2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0617", "url": "https://www.suse.com/security/cve/CVE-2022-0617" }, { "category": "external", "summary": "SUSE Bug 1196079 for CVE-2022-0617", "url": "https://bugzilla.suse.com/1196079" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T10:36:15Z", "details": "moderate" } ], "title": "CVE-2022-0617" }, { "cve": "CVE-2022-0644", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0644" } ], "notes": [ { "category": "general", "text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0644", "url": "https://www.suse.com/security/cve/CVE-2022-0644" }, { "category": "external", "summary": "SUSE Bug 1196155 for CVE-2022-0644", "url": "https://bugzilla.suse.com/1196155" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T10:36:15Z", "details": "moderate" } ], "title": "CVE-2022-0644" }, { "cve": "CVE-2022-0847", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0847" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way the \"flags\" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0847", "url": "https://www.suse.com/security/cve/CVE-2022-0847" }, { "category": "external", "summary": "SUSE Bug 1196584 for CVE-2022-0847", "url": "https://bugzilla.suse.com/1196584" }, { "category": "external", "summary": "SUSE Bug 1196601 for CVE-2022-0847", "url": "https://bugzilla.suse.com/1196601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T10:36:15Z", "details": "important" } ], "title": "CVE-2022-0847" }, { "cve": "CVE-2022-24448", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-24448" } ], "notes": [ { "category": "general", "text": "An issue was discovered in fs/nfs/dir.c in the Linux kernel before 5.16.5. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should occur, but the server instead returns uninitialized data in the file descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-24448", "url": "https://www.suse.com/security/cve/CVE-2022-24448" }, { "category": "external", "summary": "SUSE Bug 1195612 for CVE-2022-24448", "url": "https://bugzilla.suse.com/1195612" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T10:36:15Z", "details": "moderate" } ], "title": "CVE-2022-24448" }, { "cve": "CVE-2022-24959", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-24959" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.16.5. There is a memory leak in yam_siocdevprivate in drivers/net/hamradio/yam.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-24959", "url": "https://www.suse.com/security/cve/CVE-2022-24959" }, { "category": "external", "summary": "SUSE Bug 1195897 for CVE-2022-24959", "url": "https://bugzilla.suse.com/1195897" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_86-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.86.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T10:36:15Z", "details": "moderate" } ], "title": "CVE-2022-24959" } ] }
suse-su-2022:1300-1
Vulnerability from csaf_suse
Published
2022-04-22 06:39
Modified
2022-04-22 06:39
Summary
Security update for xen
Notes
Title of the patch
Security update for xen
Description of the patch
This update for xen fixes the following issues:
- CVE-2022-26356: Fixed potential race conditions in dirty memory tracking that
could cause a denial of service in the host (bsc#1197423).
- CVE-2022-26357: Fixed a potential race condition in memory cleanup for hosts
using VT-d IOMMU hardware, which could lead to a denial of service in the host
(bsc#1197425).
- CVE-2022-26358,CVE-2022-26359,CVE-2022-26360,CVE-2022-26361: Fixed various memory
corruption issues for hosts using VT-d or AMD-Vi IOMMU hardware. These could be
leveraged by an attacker to cause a denial of service in the host (bsc#1197426).
- CVE-2022-0001, CVE-2022-0002, CVE-2021-26401: Added BHB speculation issue
mitigations (bsc#1196915).
Patchnames
SUSE-2022-1300,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-1300,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-1300,SUSE-SLE-Product-RT-15-SP2-2022-1300,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-1300,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-1300,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-1300,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-1300,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-1300,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-1300,SUSE-SUSE-MicroOS-5.0-2022-1300,SUSE-Storage-7-2022-1300
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "This update for xen fixes the following issues:\n\n- CVE-2022-26356: Fixed potential race conditions in dirty memory tracking that\n could cause a denial of service in the host (bsc#1197423).\n- CVE-2022-26357: Fixed a potential race condition in memory cleanup for hosts\n using VT-d IOMMU hardware, which could lead to a denial of service in the host\n (bsc#1197425).\n- CVE-2022-26358,CVE-2022-26359,CVE-2022-26360,CVE-2022-26361: Fixed various memory\n corruption issues for hosts using VT-d or AMD-Vi IOMMU hardware. These could be\n leveraged by an attacker to cause a denial of service in the host (bsc#1197426).\n- CVE-2022-0001, CVE-2022-0002, CVE-2021-26401: Added BHB speculation issue\n mitigations (bsc#1196915).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-1300,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-1300,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-1300,SUSE-SLE-Product-RT-15-SP2-2022-1300,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-1300,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-1300,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-1300,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-1300,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-1300,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-1300,SUSE-SUSE-MicroOS-5.0-2022-1300,SUSE-Storage-7-2022-1300", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_1300-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:1300-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20221300-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:1300-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-April/010792.html" }, { "category": "self", "summary": "SUSE Bug 1194267", "url": "https://bugzilla.suse.com/1194267" }, { "category": "self", "summary": "SUSE Bug 1196915", "url": "https://bugzilla.suse.com/1196915" }, { "category": "self", "summary": "SUSE Bug 1197423", "url": "https://bugzilla.suse.com/1197423" }, { "category": "self", "summary": "SUSE Bug 1197425", "url": "https://bugzilla.suse.com/1197425" }, { "category": "self", "summary": "SUSE Bug 1197426", "url": "https://bugzilla.suse.com/1197426" }, { "category": "self", "summary": "SUSE CVE CVE-2021-26401 page", "url": "https://www.suse.com/security/cve/CVE-2021-26401/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0001 page", "url": "https://www.suse.com/security/cve/CVE-2022-0001/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0002 page", "url": "https://www.suse.com/security/cve/CVE-2022-0002/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-26356 page", "url": "https://www.suse.com/security/cve/CVE-2022-26356/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-26357 page", "url": "https://www.suse.com/security/cve/CVE-2022-26357/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-26358 page", "url": "https://www.suse.com/security/cve/CVE-2022-26358/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-26359 page", "url": "https://www.suse.com/security/cve/CVE-2022-26359/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-26360 page", "url": "https://www.suse.com/security/cve/CVE-2022-26360/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-26361 page", "url": "https://www.suse.com/security/cve/CVE-2022-26361/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2022-04-22T06:39:52Z", "generator": { "date": "2022-04-22T06:39:52Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:1300-1", "initial_release_date": "2022-04-22T06:39:52Z", "revision_history": [ { "date": "2022-04-22T06:39:52Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-4.13.4_08-150200.3.50.1.aarch64", "product": { "name": "xen-4.13.4_08-150200.3.50.1.aarch64", "product_id": "xen-4.13.4_08-150200.3.50.1.aarch64" } }, { "category": "product_version", "name": "xen-devel-4.13.4_08-150200.3.50.1.aarch64", "product": { "name": "xen-devel-4.13.4_08-150200.3.50.1.aarch64", "product_id": "xen-devel-4.13.4_08-150200.3.50.1.aarch64" } }, { "category": "product_version", "name": "xen-doc-html-4.13.4_08-150200.3.50.1.aarch64", "product": { "name": "xen-doc-html-4.13.4_08-150200.3.50.1.aarch64", "product_id": "xen-doc-html-4.13.4_08-150200.3.50.1.aarch64" } }, { "category": "product_version", "name": "xen-libs-4.13.4_08-150200.3.50.1.aarch64", "product": { "name": "xen-libs-4.13.4_08-150200.3.50.1.aarch64", "product_id": "xen-libs-4.13.4_08-150200.3.50.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-4.13.4_08-150200.3.50.1.aarch64", "product": { "name": "xen-tools-4.13.4_08-150200.3.50.1.aarch64", "product_id": "xen-tools-4.13.4_08-150200.3.50.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-domU-4.13.4_08-150200.3.50.1.aarch64", "product": { "name": "xen-tools-domU-4.13.4_08-150200.3.50.1.aarch64", "product_id": "xen-tools-domU-4.13.4_08-150200.3.50.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "xen-libs-64bit-4.13.4_08-150200.3.50.1.aarch64_ilp32", "product": { "name": "xen-libs-64bit-4.13.4_08-150200.3.50.1.aarch64_ilp32", "product_id": "xen-libs-64bit-4.13.4_08-150200.3.50.1.aarch64_ilp32" } } ], "category": "architecture", "name": "aarch64_ilp32" }, { "branches": [ { "category": "product_version", "name": "xen-devel-4.13.4_08-150200.3.50.1.i586", "product": { "name": "xen-devel-4.13.4_08-150200.3.50.1.i586", "product_id": "xen-devel-4.13.4_08-150200.3.50.1.i586" } }, { "category": "product_version", "name": "xen-libs-4.13.4_08-150200.3.50.1.i586", "product": { "name": "xen-libs-4.13.4_08-150200.3.50.1.i586", "product_id": "xen-libs-4.13.4_08-150200.3.50.1.i586" } }, { "category": "product_version", "name": "xen-tools-domU-4.13.4_08-150200.3.50.1.i586", "product": { "name": "xen-tools-domU-4.13.4_08-150200.3.50.1.i586", "product_id": "xen-tools-domU-4.13.4_08-150200.3.50.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "product": { "name": "xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "product_id": "xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "xen-4.13.4_08-150200.3.50.1.x86_64", "product": { "name": "xen-4.13.4_08-150200.3.50.1.x86_64", "product_id": "xen-4.13.4_08-150200.3.50.1.x86_64" } }, { "category": "product_version", "name": "xen-devel-4.13.4_08-150200.3.50.1.x86_64", "product": { "name": "xen-devel-4.13.4_08-150200.3.50.1.x86_64", "product_id": "xen-devel-4.13.4_08-150200.3.50.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.13.4_08-150200.3.50.1.x86_64", "product": { "name": "xen-doc-html-4.13.4_08-150200.3.50.1.x86_64", "product_id": "xen-doc-html-4.13.4_08-150200.3.50.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.13.4_08-150200.3.50.1.x86_64", "product": { "name": "xen-libs-4.13.4_08-150200.3.50.1.x86_64", "product_id": "xen-libs-4.13.4_08-150200.3.50.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.13.4_08-150200.3.50.1.x86_64", "product": { "name": "xen-libs-32bit-4.13.4_08-150200.3.50.1.x86_64", "product_id": "xen-libs-32bit-4.13.4_08-150200.3.50.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.13.4_08-150200.3.50.1.x86_64", "product": { "name": "xen-tools-4.13.4_08-150200.3.50.1.x86_64", "product_id": "xen-tools-4.13.4_08-150200.3.50.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "product": { "name": "xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "product_id": "xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Real Time 15 SP2", "product": { "name": "SUSE Linux Enterprise Real Time 15 SP2", "product_id": "SUSE Linux Enterprise Real Time 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_rt:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP2-BCL", "product": { "name": "SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_bcl:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp2" } } }, { "category": "product_name", "name": "SUSE Manager Proxy 4.1", "product": { "name": "SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-proxy:4.1" } } }, { "category": "product_name", "name": "SUSE Manager Retail Branch Server 4.1", "product": { "name": "SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-retail-branch-server:4.1" } } }, { "category": "product_name", "name": "SUSE Manager Server 4.1", "product": { "name": "SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-server:4.1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.0", "product": { "name": "SUSE Linux Enterprise Micro 5.0", "product_id": "SUSE Linux Enterprise Micro 5.0", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-microos:5.0" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 7", "product": { "name": "SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:7" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-4.13.4_08-150200.3.50.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-4.13.4_08-150200.3.50.1.x86_64" }, "product_reference": "xen-4.13.4_08-150200.3.50.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.13.4_08-150200.3.50.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-devel-4.13.4_08-150200.3.50.1.x86_64" }, "product_reference": "xen-devel-4.13.4_08-150200.3.50.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.13.4_08-150200.3.50.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-libs-4.13.4_08-150200.3.50.1.x86_64" }, "product_reference": "xen-libs-4.13.4_08-150200.3.50.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.13.4_08-150200.3.50.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-4.13.4_08-150200.3.50.1.x86_64" }, "product_reference": "xen-tools-4.13.4_08-150200.3.50.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64" }, "product_reference": "xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch" }, "product_reference": "xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.13.4_08-150200.3.50.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.4_08-150200.3.50.1.x86_64" }, "product_reference": "xen-4.13.4_08-150200.3.50.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.13.4_08-150200.3.50.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.4_08-150200.3.50.1.x86_64" }, "product_reference": "xen-devel-4.13.4_08-150200.3.50.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.13.4_08-150200.3.50.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.4_08-150200.3.50.1.x86_64" }, "product_reference": "xen-libs-4.13.4_08-150200.3.50.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.13.4_08-150200.3.50.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.4_08-150200.3.50.1.x86_64" }, "product_reference": "xen-tools-4.13.4_08-150200.3.50.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64" }, "product_reference": "xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch" }, "product_reference": "xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.13.4_08-150200.3.50.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP2", "product_id": "SUSE Linux Enterprise Real Time 15 SP2:xen-4.13.4_08-150200.3.50.1.x86_64" }, "product_reference": "xen-4.13.4_08-150200.3.50.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.13.4_08-150200.3.50.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP2", "product_id": "SUSE Linux Enterprise Real Time 15 SP2:xen-devel-4.13.4_08-150200.3.50.1.x86_64" }, "product_reference": "xen-devel-4.13.4_08-150200.3.50.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.13.4_08-150200.3.50.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP2", "product_id": "SUSE Linux Enterprise Real Time 15 SP2:xen-libs-4.13.4_08-150200.3.50.1.x86_64" }, "product_reference": "xen-libs-4.13.4_08-150200.3.50.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.13.4_08-150200.3.50.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP2", "product_id": "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-4.13.4_08-150200.3.50.1.x86_64" }, "product_reference": "xen-tools-4.13.4_08-150200.3.50.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP2", "product_id": "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64" }, "product_reference": "xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch as component of SUSE Linux Enterprise Real Time 15 SP2", "product_id": "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch" }, "product_reference": "xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.13.4_08-150200.3.50.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:xen-4.13.4_08-150200.3.50.1.x86_64" }, "product_reference": "xen-4.13.4_08-150200.3.50.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.13.4_08-150200.3.50.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:xen-devel-4.13.4_08-150200.3.50.1.x86_64" }, "product_reference": "xen-devel-4.13.4_08-150200.3.50.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.13.4_08-150200.3.50.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:xen-libs-4.13.4_08-150200.3.50.1.x86_64" }, "product_reference": "xen-libs-4.13.4_08-150200.3.50.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.13.4_08-150200.3.50.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-4.13.4_08-150200.3.50.1.x86_64" }, "product_reference": "xen-tools-4.13.4_08-150200.3.50.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64" }, "product_reference": "xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch" }, "product_reference": "xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.13.4_08-150200.3.50.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.4_08-150200.3.50.1.x86_64" }, "product_reference": "xen-4.13.4_08-150200.3.50.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.13.4_08-150200.3.50.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.4_08-150200.3.50.1.x86_64" }, "product_reference": "xen-devel-4.13.4_08-150200.3.50.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.13.4_08-150200.3.50.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.4_08-150200.3.50.1.x86_64" }, "product_reference": "xen-libs-4.13.4_08-150200.3.50.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.13.4_08-150200.3.50.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.4_08-150200.3.50.1.x86_64" }, "product_reference": "xen-tools-4.13.4_08-150200.3.50.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64" }, "product_reference": "xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch" }, "product_reference": "xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.13.4_08-150200.3.50.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.4_08-150200.3.50.1.x86_64" }, "product_reference": "xen-4.13.4_08-150200.3.50.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.13.4_08-150200.3.50.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.4_08-150200.3.50.1.x86_64" }, "product_reference": "xen-devel-4.13.4_08-150200.3.50.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.13.4_08-150200.3.50.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.4_08-150200.3.50.1.x86_64" }, "product_reference": "xen-libs-4.13.4_08-150200.3.50.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.13.4_08-150200.3.50.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.4_08-150200.3.50.1.x86_64" }, "product_reference": "xen-tools-4.13.4_08-150200.3.50.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64" }, "product_reference": "xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch" }, "product_reference": "xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.13.4_08-150200.3.50.1.x86_64 as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:xen-4.13.4_08-150200.3.50.1.x86_64" }, "product_reference": "xen-4.13.4_08-150200.3.50.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.13.4_08-150200.3.50.1.x86_64 as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64" }, "product_reference": "xen-devel-4.13.4_08-150200.3.50.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.13.4_08-150200.3.50.1.x86_64 as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64" }, "product_reference": "xen-libs-4.13.4_08-150200.3.50.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.13.4_08-150200.3.50.1.x86_64 as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64" }, "product_reference": "xen-tools-4.13.4_08-150200.3.50.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64 as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64" }, "product_reference": "xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch" }, "product_reference": "xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.13.4_08-150200.3.50.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:xen-4.13.4_08-150200.3.50.1.x86_64" }, "product_reference": "xen-4.13.4_08-150200.3.50.1.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.13.4_08-150200.3.50.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64" }, "product_reference": "xen-devel-4.13.4_08-150200.3.50.1.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.13.4_08-150200.3.50.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64" }, "product_reference": "xen-libs-4.13.4_08-150200.3.50.1.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.13.4_08-150200.3.50.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64" }, "product_reference": "xen-tools-4.13.4_08-150200.3.50.1.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64" }, "product_reference": "xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch" }, "product_reference": "xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.13.4_08-150200.3.50.1.x86_64 as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:xen-4.13.4_08-150200.3.50.1.x86_64" }, "product_reference": "xen-4.13.4_08-150200.3.50.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.13.4_08-150200.3.50.1.x86_64 as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64" }, "product_reference": "xen-devel-4.13.4_08-150200.3.50.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.13.4_08-150200.3.50.1.x86_64 as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64" }, "product_reference": "xen-libs-4.13.4_08-150200.3.50.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.13.4_08-150200.3.50.1.x86_64 as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64" }, "product_reference": "xen-tools-4.13.4_08-150200.3.50.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64 as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64" }, "product_reference": "xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch" }, "product_reference": "xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.13.4_08-150200.3.50.1.x86_64 as component of SUSE Linux Enterprise Micro 5.0", "product_id": "SUSE Linux Enterprise Micro 5.0:xen-libs-4.13.4_08-150200.3.50.1.x86_64" }, "product_reference": "xen-libs-4.13.4_08-150200.3.50.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.0" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.13.4_08-150200.3.50.1.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:xen-4.13.4_08-150200.3.50.1.x86_64" }, "product_reference": "xen-4.13.4_08-150200.3.50.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.13.4_08-150200.3.50.1.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:xen-devel-4.13.4_08-150200.3.50.1.x86_64" }, "product_reference": "xen-devel-4.13.4_08-150200.3.50.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.13.4_08-150200.3.50.1.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:xen-libs-4.13.4_08-150200.3.50.1.x86_64" }, "product_reference": "xen-libs-4.13.4_08-150200.3.50.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.13.4_08-150200.3.50.1.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:xen-tools-4.13.4_08-150200.3.50.1.x86_64" }, "product_reference": "xen-tools-4.13.4_08-150200.3.50.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64" }, "product_reference": "xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch" }, "product_reference": "xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-26401", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-26401" } ], "notes": [ { "category": "general", "text": "LFENCE/JMP (mitigation V2-2) may not sufficiently mitigate CVE-2017-5715 on some AMD CPUs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Micro 5.0:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Proxy 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Retail Branch Server 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Server 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2021-26401", "url": "https://www.suse.com/security/cve/CVE-2021-26401" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2021-26401", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2021-26401", "url": "https://bugzilla.suse.com/1196901" }, { "category": "external", "summary": "SUSE Bug 1209630 for CVE-2021-26401", "url": "https://bugzilla.suse.com/1209630" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Micro 5.0:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Proxy 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Retail Branch Server 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Server 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Micro 5.0:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Proxy 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Retail Branch Server 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Server 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2022-04-22T06:39:52Z", "details": "moderate" } ], "title": "CVE-2021-26401" }, { "cve": "CVE-2022-0001", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0001" } ], "notes": [ { "category": "general", "text": "Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Micro 5.0:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Proxy 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Retail Branch Server 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Server 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0001", "url": "https://www.suse.com/security/cve/CVE-2022-0001" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2022-0001", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2022-0001", "url": "https://bugzilla.suse.com/1196901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Micro 5.0:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Proxy 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Retail Branch Server 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Server 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Micro 5.0:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Proxy 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Retail Branch Server 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Server 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2022-04-22T06:39:52Z", "details": "moderate" } ], "title": "CVE-2022-0001" }, { "cve": "CVE-2022-0002", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0002" } ], "notes": [ { "category": "general", "text": "Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Micro 5.0:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Proxy 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Retail Branch Server 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Server 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0002", "url": "https://www.suse.com/security/cve/CVE-2022-0002" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2022-0002", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2022-0002", "url": "https://bugzilla.suse.com/1196901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Micro 5.0:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Proxy 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Retail Branch Server 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Server 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Micro 5.0:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Proxy 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Retail Branch Server 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Server 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2022-04-22T06:39:52Z", "details": "moderate" } ], "title": "CVE-2022-0002" }, { "cve": "CVE-2022-26356", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-26356" } ], "notes": [ { "category": "general", "text": "Racy interactions between dirty vram tracking and paging log dirty hypercalls Activation of log dirty mode done by XEN_DMOP_track_dirty_vram (was named HVMOP_track_dirty_vram before Xen 4.9) is racy with ongoing log dirty hypercalls. A suitably timed call to XEN_DMOP_track_dirty_vram can enable log dirty while another CPU is still in the process of tearing down the structures related to a previously enabled log dirty mode (XEN_DOMCTL_SHADOW_OP_OFF). This is due to lack of mutually exclusive locking between both operations and can lead to entries being added in already freed slots, resulting in a memory leak.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Micro 5.0:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Proxy 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Retail Branch Server 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Server 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-26356", "url": "https://www.suse.com/security/cve/CVE-2022-26356" }, { "category": "external", "summary": "SUSE Bug 1197423 for CVE-2022-26356", "url": "https://bugzilla.suse.com/1197423" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Micro 5.0:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Proxy 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Retail Branch Server 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Server 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Micro 5.0:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Proxy 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Retail Branch Server 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Server 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2022-04-22T06:39:52Z", "details": "moderate" } ], "title": "CVE-2022-26356" }, { "cve": "CVE-2022-26357", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-26357" } ], "notes": [ { "category": "general", "text": "race in VT-d domain ID cleanup Xen domain IDs are up to 15 bits wide. VT-d hardware may allow for only less than 15 bits to hold a domain ID associating a physical device with a particular domain. Therefore internally Xen domain IDs are mapped to the smaller value range. The cleaning up of the housekeeping structures has a race, allowing for VT-d domain IDs to be leaked and flushes to be bypassed.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Micro 5.0:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Proxy 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Retail Branch Server 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Server 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-26357", "url": "https://www.suse.com/security/cve/CVE-2022-26357" }, { "category": "external", "summary": "SUSE Bug 1197425 for CVE-2022-26357", "url": "https://bugzilla.suse.com/1197425" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Micro 5.0:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Proxy 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Retail Branch Server 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Server 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Micro 5.0:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Proxy 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Retail Branch Server 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Server 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2022-04-22T06:39:52Z", "details": "moderate" } ], "title": "CVE-2022-26357" }, { "cve": "CVE-2022-26358", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-26358" } ], "notes": [ { "category": "general", "text": "IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Certain PCI devices in a system might be assigned Reserved Memory Regions (specified via Reserved Memory Region Reporting, \"RMRR\") for Intel VT-d or Unity Mapping ranges for AMD-Vi. These are typically used for platform tasks such as legacy USB emulation. Since the precise purpose of these regions is unknown, once a device associated with such a region is active, the mappings of these regions need to remain continuouly accessible by the device. This requirement has been violated. Subsequent DMA or interrupts from the device may have unpredictable behaviour, ranging from IOMMU faults to memory corruption.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Micro 5.0:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Proxy 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Retail Branch Server 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Server 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-26358", "url": "https://www.suse.com/security/cve/CVE-2022-26358" }, { "category": "external", "summary": "SUSE Bug 1197426 for CVE-2022-26358", "url": "https://bugzilla.suse.com/1197426" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Micro 5.0:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Proxy 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Retail Branch Server 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Server 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Micro 5.0:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Proxy 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Retail Branch Server 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Server 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2022-04-22T06:39:52Z", "details": "moderate" } ], "title": "CVE-2022-26358" }, { "cve": "CVE-2022-26359", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-26359" } ], "notes": [ { "category": "general", "text": "IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Certain PCI devices in a system might be assigned Reserved Memory Regions (specified via Reserved Memory Region Reporting, \"RMRR\") for Intel VT-d or Unity Mapping ranges for AMD-Vi. These are typically used for platform tasks such as legacy USB emulation. Since the precise purpose of these regions is unknown, once a device associated with such a region is active, the mappings of these regions need to remain continuouly accessible by the device. This requirement has been violated. Subsequent DMA or interrupts from the device may have unpredictable behaviour, ranging from IOMMU faults to memory corruption.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Micro 5.0:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Proxy 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Retail Branch Server 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Server 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-26359", "url": "https://www.suse.com/security/cve/CVE-2022-26359" }, { "category": "external", "summary": "SUSE Bug 1197426 for CVE-2022-26359", "url": "https://bugzilla.suse.com/1197426" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Micro 5.0:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Proxy 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Retail Branch Server 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Server 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Micro 5.0:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Proxy 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Retail Branch Server 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Server 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2022-04-22T06:39:52Z", "details": "moderate" } ], "title": "CVE-2022-26359" }, { "cve": "CVE-2022-26360", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-26360" } ], "notes": [ { "category": "general", "text": "IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Certain PCI devices in a system might be assigned Reserved Memory Regions (specified via Reserved Memory Region Reporting, \"RMRR\") for Intel VT-d or Unity Mapping ranges for AMD-Vi. These are typically used for platform tasks such as legacy USB emulation. Since the precise purpose of these regions is unknown, once a device associated with such a region is active, the mappings of these regions need to remain continuouly accessible by the device. This requirement has been violated. Subsequent DMA or interrupts from the device may have unpredictable behaviour, ranging from IOMMU faults to memory corruption.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Micro 5.0:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Proxy 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Retail Branch Server 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Server 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-26360", "url": "https://www.suse.com/security/cve/CVE-2022-26360" }, { "category": "external", "summary": "SUSE Bug 1197426 for CVE-2022-26360", "url": "https://bugzilla.suse.com/1197426" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Micro 5.0:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Proxy 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Retail Branch Server 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Server 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Micro 5.0:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Proxy 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Retail Branch Server 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Server 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2022-04-22T06:39:52Z", "details": "moderate" } ], "title": "CVE-2022-26360" }, { "cve": "CVE-2022-26361", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-26361" } ], "notes": [ { "category": "general", "text": "IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Certain PCI devices in a system might be assigned Reserved Memory Regions (specified via Reserved Memory Region Reporting, \"RMRR\") for Intel VT-d or Unity Mapping ranges for AMD-Vi. These are typically used for platform tasks such as legacy USB emulation. Since the precise purpose of these regions is unknown, once a device associated with such a region is active, the mappings of these regions need to remain continuouly accessible by the device. This requirement has been violated. Subsequent DMA or interrupts from the device may have unpredictable behaviour, ranging from IOMMU faults to memory corruption.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Micro 5.0:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Proxy 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Retail Branch Server 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Server 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-26361", "url": "https://www.suse.com/security/cve/CVE-2022-26361" }, { "category": "external", "summary": "SUSE Bug 1197426 for CVE-2022-26361", "url": "https://bugzilla.suse.com/1197426" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Micro 5.0:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Proxy 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Retail Branch Server 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Server 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Enterprise Storage 7:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Micro 5.0:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Proxy 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Proxy 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Retail Branch Server 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Retail Branch Server 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch", "SUSE Manager Server 4.1:xen-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-devel-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-libs-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-domU-4.13.4_08-150200.3.50.1.x86_64", "SUSE Manager Server 4.1:xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2022-04-22T06:39:52Z", "details": "moderate" } ], "title": "CVE-2022-26361" } ] }
suse-su-2022:1359-1
Vulnerability from csaf_suse
Published
2022-04-25 11:26
Modified
2022-04-25 11:26
Summary
Security update for xen
Notes
Title of the patch
Security update for xen
Description of the patch
This update for xen fixes the following issues:
- CVE-2022-26356: Fixed potential race conditions in dirty memory tracking that
could cause a denial of service in the host (bsc#1197423).
- CVE-2022-26357: Fixed a potential race condition in memory cleanup for hosts
using VT-d IOMMU hardware, which could lead to a denial of service in the host
(bsc#1197425).
- CVE-2022-26358,CVE-2022-26359,CVE-2022-26360,CVE-2022-26361: Fixed various memory
corruption issues for hosts using VT-d or AMD-Vi IOMMU hardware. These could be
leveraged by an attacker to cause a denial of service in the host (bsc#1197426).
- CVE-2022-0001, CVE-2022-0002, CVE-2021-26401: Added BHB speculation issue
mitigations (bsc#1196915).
Patchnames
SUSE-2022-1359,SUSE-SLE-Product-HPC-15-2022-1359,SUSE-SLE-Product-SLES_SAP-15-2022-1359
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "This update for xen fixes the following issues:\n\n- CVE-2022-26356: Fixed potential race conditions in dirty memory tracking that\n could cause a denial of service in the host (bsc#1197423).\n- CVE-2022-26357: Fixed a potential race condition in memory cleanup for hosts\n using VT-d IOMMU hardware, which could lead to a denial of service in the host\n (bsc#1197425).\n- CVE-2022-26358,CVE-2022-26359,CVE-2022-26360,CVE-2022-26361: Fixed various memory\n corruption issues for hosts using VT-d or AMD-Vi IOMMU hardware. These could be\n leveraged by an attacker to cause a denial of service in the host (bsc#1197426).\n- CVE-2022-0001, CVE-2022-0002, CVE-2021-26401: Added BHB speculation issue\n mitigations (bsc#1196915).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-1359,SUSE-SLE-Product-HPC-15-2022-1359,SUSE-SLE-Product-SLES_SAP-15-2022-1359", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_1359-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:1359-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20221359-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:1359-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-April/010818.html" }, { "category": "self", "summary": "SUSE Bug 1196915", "url": "https://bugzilla.suse.com/1196915" }, { "category": "self", "summary": "SUSE Bug 1197423", "url": "https://bugzilla.suse.com/1197423" }, { "category": "self", "summary": "SUSE Bug 1197425", "url": "https://bugzilla.suse.com/1197425" }, { "category": "self", "summary": "SUSE Bug 1197426", "url": "https://bugzilla.suse.com/1197426" }, { "category": "self", "summary": "SUSE CVE CVE-2021-26401 page", "url": "https://www.suse.com/security/cve/CVE-2021-26401/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0001 page", "url": "https://www.suse.com/security/cve/CVE-2022-0001/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0002 page", "url": "https://www.suse.com/security/cve/CVE-2022-0002/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-26356 page", "url": "https://www.suse.com/security/cve/CVE-2022-26356/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-26357 page", "url": "https://www.suse.com/security/cve/CVE-2022-26357/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-26358 page", "url": "https://www.suse.com/security/cve/CVE-2022-26358/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-26359 page", "url": "https://www.suse.com/security/cve/CVE-2022-26359/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-26360 page", "url": "https://www.suse.com/security/cve/CVE-2022-26360/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-26361 page", "url": "https://www.suse.com/security/cve/CVE-2022-26361/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2022-04-25T11:26:19Z", "generator": { "date": "2022-04-25T11:26:19Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:1359-1", "initial_release_date": "2022-04-25T11:26:19Z", "revision_history": [ { "date": "2022-04-25T11:26:19Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-4.10.4_34-150000.3.74.1.aarch64", "product": { "name": "xen-4.10.4_34-150000.3.74.1.aarch64", "product_id": "xen-4.10.4_34-150000.3.74.1.aarch64" } }, { "category": "product_version", "name": "xen-devel-4.10.4_34-150000.3.74.1.aarch64", "product": { "name": "xen-devel-4.10.4_34-150000.3.74.1.aarch64", "product_id": "xen-devel-4.10.4_34-150000.3.74.1.aarch64" } }, { "category": "product_version", "name": "xen-doc-html-4.10.4_34-150000.3.74.1.aarch64", "product": { "name": "xen-doc-html-4.10.4_34-150000.3.74.1.aarch64", "product_id": "xen-doc-html-4.10.4_34-150000.3.74.1.aarch64" } }, { "category": "product_version", "name": "xen-libs-4.10.4_34-150000.3.74.1.aarch64", "product": { "name": "xen-libs-4.10.4_34-150000.3.74.1.aarch64", "product_id": "xen-libs-4.10.4_34-150000.3.74.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-4.10.4_34-150000.3.74.1.aarch64", "product": { "name": "xen-tools-4.10.4_34-150000.3.74.1.aarch64", "product_id": "xen-tools-4.10.4_34-150000.3.74.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-domU-4.10.4_34-150000.3.74.1.aarch64", "product": { "name": "xen-tools-domU-4.10.4_34-150000.3.74.1.aarch64", "product_id": "xen-tools-domU-4.10.4_34-150000.3.74.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "xen-libs-64bit-4.10.4_34-150000.3.74.1.aarch64_ilp32", "product": { "name": "xen-libs-64bit-4.10.4_34-150000.3.74.1.aarch64_ilp32", "product_id": "xen-libs-64bit-4.10.4_34-150000.3.74.1.aarch64_ilp32" } } ], "category": "architecture", "name": "aarch64_ilp32" }, { "branches": [ { "category": "product_version", "name": "xen-devel-4.10.4_34-150000.3.74.1.i586", "product": { "name": "xen-devel-4.10.4_34-150000.3.74.1.i586", "product_id": "xen-devel-4.10.4_34-150000.3.74.1.i586" } }, { "category": "product_version", "name": "xen-libs-4.10.4_34-150000.3.74.1.i586", "product": { "name": "xen-libs-4.10.4_34-150000.3.74.1.i586", "product_id": "xen-libs-4.10.4_34-150000.3.74.1.i586" } }, { "category": "product_version", "name": "xen-tools-domU-4.10.4_34-150000.3.74.1.i586", "product": { "name": "xen-tools-domU-4.10.4_34-150000.3.74.1.i586", "product_id": "xen-tools-domU-4.10.4_34-150000.3.74.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "xen-4.10.4_34-150000.3.74.1.x86_64", "product": { "name": "xen-4.10.4_34-150000.3.74.1.x86_64", "product_id": "xen-4.10.4_34-150000.3.74.1.x86_64" } }, { "category": "product_version", "name": "xen-devel-4.10.4_34-150000.3.74.1.x86_64", "product": { "name": "xen-devel-4.10.4_34-150000.3.74.1.x86_64", "product_id": "xen-devel-4.10.4_34-150000.3.74.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.10.4_34-150000.3.74.1.x86_64", "product": { "name": "xen-doc-html-4.10.4_34-150000.3.74.1.x86_64", "product_id": "xen-doc-html-4.10.4_34-150000.3.74.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.10.4_34-150000.3.74.1.x86_64", "product": { "name": "xen-libs-4.10.4_34-150000.3.74.1.x86_64", "product_id": "xen-libs-4.10.4_34-150000.3.74.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.10.4_34-150000.3.74.1.x86_64", "product": { "name": "xen-libs-32bit-4.10.4_34-150000.3.74.1.x86_64", "product_id": "xen-libs-32bit-4.10.4_34-150000.3.74.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.10.4_34-150000.3.74.1.x86_64", "product": { "name": "xen-tools-4.10.4_34-150000.3.74.1.x86_64", "product_id": "xen-tools-4.10.4_34-150000.3.74.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64", "product": { "name": "xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64", "product_id": "xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-4.10.4_34-150000.3.74.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-4.10.4_34-150000.3.74.1.x86_64" }, "product_reference": "xen-4.10.4_34-150000.3.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.10.4_34-150000.3.74.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-devel-4.10.4_34-150000.3.74.1.x86_64" }, "product_reference": "xen-devel-4.10.4_34-150000.3.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.10.4_34-150000.3.74.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-libs-4.10.4_34-150000.3.74.1.x86_64" }, "product_reference": "xen-libs-4.10.4_34-150000.3.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.10.4_34-150000.3.74.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-4.10.4_34-150000.3.74.1.x86_64" }, "product_reference": "xen-tools-4.10.4_34-150000.3.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64" }, "product_reference": "xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.10.4_34-150000.3.74.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-4.10.4_34-150000.3.74.1.x86_64" }, "product_reference": "xen-4.10.4_34-150000.3.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.10.4_34-150000.3.74.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-devel-4.10.4_34-150000.3.74.1.x86_64" }, "product_reference": "xen-devel-4.10.4_34-150000.3.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.10.4_34-150000.3.74.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-libs-4.10.4_34-150000.3.74.1.x86_64" }, "product_reference": "xen-libs-4.10.4_34-150000.3.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.10.4_34-150000.3.74.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-4.10.4_34-150000.3.74.1.x86_64" }, "product_reference": "xen-tools-4.10.4_34-150000.3.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64" }, "product_reference": "xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.10.4_34-150000.3.74.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:xen-4.10.4_34-150000.3.74.1.x86_64" }, "product_reference": "xen-4.10.4_34-150000.3.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.10.4_34-150000.3.74.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:xen-devel-4.10.4_34-150000.3.74.1.x86_64" }, "product_reference": "xen-devel-4.10.4_34-150000.3.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.10.4_34-150000.3.74.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:xen-libs-4.10.4_34-150000.3.74.1.x86_64" }, "product_reference": "xen-libs-4.10.4_34-150000.3.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.10.4_34-150000.3.74.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-4.10.4_34-150000.3.74.1.x86_64" }, "product_reference": "xen-tools-4.10.4_34-150000.3.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64" }, "product_reference": "xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-26401", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-26401" } ], "notes": [ { "category": "general", "text": "LFENCE/JMP (mitigation V2-2) may not sufficiently mitigate CVE-2017-5715 on some AMD CPUs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-26401", "url": "https://www.suse.com/security/cve/CVE-2021-26401" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2021-26401", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2021-26401", "url": "https://bugzilla.suse.com/1196901" }, { "category": "external", "summary": "SUSE Bug 1209630 for CVE-2021-26401", "url": "https://bugzilla.suse.com/1209630" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-25T11:26:19Z", "details": "moderate" } ], "title": "CVE-2021-26401" }, { "cve": "CVE-2022-0001", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0001" } ], "notes": [ { "category": "general", "text": "Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0001", "url": "https://www.suse.com/security/cve/CVE-2022-0001" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2022-0001", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2022-0001", "url": "https://bugzilla.suse.com/1196901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-25T11:26:19Z", "details": "moderate" } ], "title": "CVE-2022-0001" }, { "cve": "CVE-2022-0002", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0002" } ], "notes": [ { "category": "general", "text": "Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0002", "url": "https://www.suse.com/security/cve/CVE-2022-0002" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2022-0002", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2022-0002", "url": "https://bugzilla.suse.com/1196901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-25T11:26:19Z", "details": "moderate" } ], "title": "CVE-2022-0002" }, { "cve": "CVE-2022-26356", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-26356" } ], "notes": [ { "category": "general", "text": "Racy interactions between dirty vram tracking and paging log dirty hypercalls Activation of log dirty mode done by XEN_DMOP_track_dirty_vram (was named HVMOP_track_dirty_vram before Xen 4.9) is racy with ongoing log dirty hypercalls. A suitably timed call to XEN_DMOP_track_dirty_vram can enable log dirty while another CPU is still in the process of tearing down the structures related to a previously enabled log dirty mode (XEN_DOMCTL_SHADOW_OP_OFF). This is due to lack of mutually exclusive locking between both operations and can lead to entries being added in already freed slots, resulting in a memory leak.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-26356", "url": "https://www.suse.com/security/cve/CVE-2022-26356" }, { "category": "external", "summary": "SUSE Bug 1197423 for CVE-2022-26356", "url": "https://bugzilla.suse.com/1197423" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-25T11:26:19Z", "details": "moderate" } ], "title": "CVE-2022-26356" }, { "cve": "CVE-2022-26357", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-26357" } ], "notes": [ { "category": "general", "text": "race in VT-d domain ID cleanup Xen domain IDs are up to 15 bits wide. VT-d hardware may allow for only less than 15 bits to hold a domain ID associating a physical device with a particular domain. Therefore internally Xen domain IDs are mapped to the smaller value range. The cleaning up of the housekeeping structures has a race, allowing for VT-d domain IDs to be leaked and flushes to be bypassed.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-26357", "url": "https://www.suse.com/security/cve/CVE-2022-26357" }, { "category": "external", "summary": "SUSE Bug 1197425 for CVE-2022-26357", "url": "https://bugzilla.suse.com/1197425" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-25T11:26:19Z", "details": "moderate" } ], "title": "CVE-2022-26357" }, { "cve": "CVE-2022-26358", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-26358" } ], "notes": [ { "category": "general", "text": "IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Certain PCI devices in a system might be assigned Reserved Memory Regions (specified via Reserved Memory Region Reporting, \"RMRR\") for Intel VT-d or Unity Mapping ranges for AMD-Vi. These are typically used for platform tasks such as legacy USB emulation. Since the precise purpose of these regions is unknown, once a device associated with such a region is active, the mappings of these regions need to remain continuouly accessible by the device. This requirement has been violated. Subsequent DMA or interrupts from the device may have unpredictable behaviour, ranging from IOMMU faults to memory corruption.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-26358", "url": "https://www.suse.com/security/cve/CVE-2022-26358" }, { "category": "external", "summary": "SUSE Bug 1197426 for CVE-2022-26358", "url": "https://bugzilla.suse.com/1197426" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-25T11:26:19Z", "details": "moderate" } ], "title": "CVE-2022-26358" }, { "cve": "CVE-2022-26359", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-26359" } ], "notes": [ { "category": "general", "text": "IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Certain PCI devices in a system might be assigned Reserved Memory Regions (specified via Reserved Memory Region Reporting, \"RMRR\") for Intel VT-d or Unity Mapping ranges for AMD-Vi. These are typically used for platform tasks such as legacy USB emulation. Since the precise purpose of these regions is unknown, once a device associated with such a region is active, the mappings of these regions need to remain continuouly accessible by the device. This requirement has been violated. Subsequent DMA or interrupts from the device may have unpredictable behaviour, ranging from IOMMU faults to memory corruption.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-26359", "url": "https://www.suse.com/security/cve/CVE-2022-26359" }, { "category": "external", "summary": "SUSE Bug 1197426 for CVE-2022-26359", "url": "https://bugzilla.suse.com/1197426" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-25T11:26:19Z", "details": "moderate" } ], "title": "CVE-2022-26359" }, { "cve": "CVE-2022-26360", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-26360" } ], "notes": [ { "category": "general", "text": "IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Certain PCI devices in a system might be assigned Reserved Memory Regions (specified via Reserved Memory Region Reporting, \"RMRR\") for Intel VT-d or Unity Mapping ranges for AMD-Vi. These are typically used for platform tasks such as legacy USB emulation. Since the precise purpose of these regions is unknown, once a device associated with such a region is active, the mappings of these regions need to remain continuouly accessible by the device. This requirement has been violated. Subsequent DMA or interrupts from the device may have unpredictable behaviour, ranging from IOMMU faults to memory corruption.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-26360", "url": "https://www.suse.com/security/cve/CVE-2022-26360" }, { "category": "external", "summary": "SUSE Bug 1197426 for CVE-2022-26360", "url": "https://bugzilla.suse.com/1197426" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-25T11:26:19Z", "details": "moderate" } ], "title": "CVE-2022-26360" }, { "cve": "CVE-2022-26361", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-26361" } ], "notes": [ { "category": "general", "text": "IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Certain PCI devices in a system might be assigned Reserved Memory Regions (specified via Reserved Memory Region Reporting, \"RMRR\") for Intel VT-d or Unity Mapping ranges for AMD-Vi. These are typically used for platform tasks such as legacy USB emulation. Since the precise purpose of these regions is unknown, once a device associated with such a region is active, the mappings of these regions need to remain continuouly accessible by the device. This requirement has been violated. Subsequent DMA or interrupts from the device may have unpredictable behaviour, ranging from IOMMU faults to memory corruption.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-26361", "url": "https://www.suse.com/security/cve/CVE-2022-26361" }, { "category": "external", "summary": "SUSE Bug 1197426 for CVE-2022-26361", "url": "https://bugzilla.suse.com/1197426" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-devel-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-libs-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-4.10.4_34-150000.3.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:xen-tools-domU-4.10.4_34-150000.3.74.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-25T11:26:19Z", "details": "moderate" } ], "title": "CVE-2022-26361" } ] }
suse-su-2022:1408-1
Vulnerability from csaf_suse
Published
2022-04-26 09:19
Modified
2022-04-26 09:19
Summary
Security update for xen
Notes
Title of the patch
Security update for xen
Description of the patch
This update for xen fixes the following issues:
- CVE-2022-26356: Fixed potential race conditions in dirty memory tracking that
could cause a denial of service in the host (bsc#1197423).
- CVE-2022-26357: Fixed a potential race condition in memory cleanup for hosts
using VT-d IOMMU hardware, which could lead to a denial of service in the host
(bsc#1197425).
- CVE-2022-26358,CVE-2022-26359,CVE-2022-26360,CVE-2022-26361: Fixed various memory
corruption issues for hosts using VT-d or AMD-Vi IOMMU hardware. These could be
leveraged by an attacker to cause a denial of service in the host (bsc#1197426).
- CVE-2022-0001, CVE-2022-0002, CVE-2021-26401: Added BHB speculation issue
mitigations (bsc#1196915).
Patchnames
HPE-Helion-OpenStack-8-2022-1408,SUSE-2022-1408,SUSE-OpenStack-Cloud-8-2022-1408,SUSE-OpenStack-Cloud-Crowbar-8-2022-1408,SUSE-SLE-SAP-12-SP3-2022-1408,SUSE-SLE-SERVER-12-SP3-2022-1408,SUSE-SLE-SERVER-12-SP3-BCL-2022-1408
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "This update for xen fixes the following issues:\n\n- CVE-2022-26356: Fixed potential race conditions in dirty memory tracking that\n could cause a denial of service in the host (bsc#1197423).\n- CVE-2022-26357: Fixed a potential race condition in memory cleanup for hosts\n using VT-d IOMMU hardware, which could lead to a denial of service in the host\n (bsc#1197425).\n- CVE-2022-26358,CVE-2022-26359,CVE-2022-26360,CVE-2022-26361: Fixed various memory\n corruption issues for hosts using VT-d or AMD-Vi IOMMU hardware. These could be\n leveraged by an attacker to cause a denial of service in the host (bsc#1197426).\n- CVE-2022-0001, CVE-2022-0002, CVE-2021-26401: Added BHB speculation issue\n mitigations (bsc#1196915).\n", "title": "Description of the patch" }, { "category": "details", "text": "HPE-Helion-OpenStack-8-2022-1408,SUSE-2022-1408,SUSE-OpenStack-Cloud-8-2022-1408,SUSE-OpenStack-Cloud-Crowbar-8-2022-1408,SUSE-SLE-SAP-12-SP3-2022-1408,SUSE-SLE-SERVER-12-SP3-2022-1408,SUSE-SLE-SERVER-12-SP3-BCL-2022-1408", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_1408-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:1408-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20221408-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:1408-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-April/010836.html" }, { "category": "self", "summary": "SUSE Bug 1196915", "url": "https://bugzilla.suse.com/1196915" }, { "category": "self", "summary": "SUSE Bug 1197423", "url": "https://bugzilla.suse.com/1197423" }, { "category": "self", "summary": "SUSE Bug 1197425", "url": "https://bugzilla.suse.com/1197425" }, { "category": "self", "summary": "SUSE Bug 1197426", "url": "https://bugzilla.suse.com/1197426" }, { "category": "self", "summary": "SUSE CVE CVE-2021-26401 page", "url": "https://www.suse.com/security/cve/CVE-2021-26401/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0001 page", "url": "https://www.suse.com/security/cve/CVE-2022-0001/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0002 page", "url": "https://www.suse.com/security/cve/CVE-2022-0002/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-26356 page", "url": "https://www.suse.com/security/cve/CVE-2022-26356/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-26357 page", "url": "https://www.suse.com/security/cve/CVE-2022-26357/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-26358 page", "url": "https://www.suse.com/security/cve/CVE-2022-26358/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-26359 page", "url": "https://www.suse.com/security/cve/CVE-2022-26359/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-26360 page", "url": "https://www.suse.com/security/cve/CVE-2022-26360/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-26361 page", "url": "https://www.suse.com/security/cve/CVE-2022-26361/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2022-04-26T09:19:38Z", "generator": { "date": "2022-04-26T09:19:38Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:1408-1", "initial_release_date": "2022-04-26T09:19:38Z", "revision_history": [ { "date": "2022-04-26T09:19:38Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-4.9.4_28-3.103.1.aarch64", "product": { "name": "xen-4.9.4_28-3.103.1.aarch64", "product_id": "xen-4.9.4_28-3.103.1.aarch64" } }, { "category": "product_version", "name": "xen-devel-4.9.4_28-3.103.1.aarch64", "product": { "name": "xen-devel-4.9.4_28-3.103.1.aarch64", "product_id": "xen-devel-4.9.4_28-3.103.1.aarch64" } }, { "category": "product_version", "name": "xen-doc-html-4.9.4_28-3.103.1.aarch64", "product": { "name": "xen-doc-html-4.9.4_28-3.103.1.aarch64", "product_id": "xen-doc-html-4.9.4_28-3.103.1.aarch64" } }, { "category": "product_version", "name": "xen-libs-4.9.4_28-3.103.1.aarch64", "product": { "name": "xen-libs-4.9.4_28-3.103.1.aarch64", "product_id": "xen-libs-4.9.4_28-3.103.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-4.9.4_28-3.103.1.aarch64", "product": { "name": "xen-tools-4.9.4_28-3.103.1.aarch64", "product_id": "xen-tools-4.9.4_28-3.103.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-domU-4.9.4_28-3.103.1.aarch64", "product": { "name": "xen-tools-domU-4.9.4_28-3.103.1.aarch64", "product_id": "xen-tools-domU-4.9.4_28-3.103.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "xen-libs-64bit-4.9.4_28-3.103.1.aarch64_ilp32", "product": { "name": "xen-libs-64bit-4.9.4_28-3.103.1.aarch64_ilp32", "product_id": "xen-libs-64bit-4.9.4_28-3.103.1.aarch64_ilp32" } } ], "category": "architecture", "name": "aarch64_ilp32" }, { "branches": [ { "category": "product_version", "name": "xen-devel-4.9.4_28-3.103.1.i586", "product": { "name": "xen-devel-4.9.4_28-3.103.1.i586", "product_id": "xen-devel-4.9.4_28-3.103.1.i586" } }, { "category": "product_version", "name": "xen-libs-4.9.4_28-3.103.1.i586", "product": { "name": "xen-libs-4.9.4_28-3.103.1.i586", "product_id": "xen-libs-4.9.4_28-3.103.1.i586" } }, { "category": "product_version", "name": "xen-tools-domU-4.9.4_28-3.103.1.i586", "product": { "name": "xen-tools-domU-4.9.4_28-3.103.1.i586", "product_id": "xen-tools-domU-4.9.4_28-3.103.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "xen-4.9.4_28-3.103.1.x86_64", "product": { "name": "xen-4.9.4_28-3.103.1.x86_64", "product_id": "xen-4.9.4_28-3.103.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.9.4_28-3.103.1.x86_64", "product": { "name": "xen-doc-html-4.9.4_28-3.103.1.x86_64", "product_id": "xen-doc-html-4.9.4_28-3.103.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.9.4_28-3.103.1.x86_64", "product": { "name": "xen-libs-4.9.4_28-3.103.1.x86_64", "product_id": "xen-libs-4.9.4_28-3.103.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "product": { "name": "xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "product_id": "xen-libs-32bit-4.9.4_28-3.103.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.9.4_28-3.103.1.x86_64", "product": { "name": "xen-tools-4.9.4_28-3.103.1.x86_64", "product_id": "xen-tools-4.9.4_28-3.103.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.9.4_28-3.103.1.x86_64", "product": { "name": "xen-tools-domU-4.9.4_28-3.103.1.x86_64", "product_id": "xen-tools-domU-4.9.4_28-3.103.1.x86_64" } }, { "category": "product_version", "name": "xen-devel-4.9.4_28-3.103.1.x86_64", "product": { "name": "xen-devel-4.9.4_28-3.103.1.x86_64", "product_id": "xen-devel-4.9.4_28-3.103.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "HPE Helion OpenStack 8", "product": { "name": "HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8", "product_identification_helper": { "cpe": "cpe:/o:suse:hpe-helion-openstack:8" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud 8", "product": { "name": "SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:8" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud Crowbar 8", "product": { "name": "SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:8" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-4.9.4_28-3.103.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:xen-4.9.4_28-3.103.1.x86_64" }, "product_reference": "xen-4.9.4_28-3.103.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.9.4_28-3.103.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:xen-doc-html-4.9.4_28-3.103.1.x86_64" }, "product_reference": "xen-doc-html-4.9.4_28-3.103.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.9.4_28-3.103.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:xen-libs-4.9.4_28-3.103.1.x86_64" }, "product_reference": "xen-libs-4.9.4_28-3.103.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.9.4_28-3.103.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64" }, "product_reference": "xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.9.4_28-3.103.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:xen-tools-4.9.4_28-3.103.1.x86_64" }, "product_reference": "xen-tools-4.9.4_28-3.103.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.9.4_28-3.103.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64" }, "product_reference": "xen-tools-domU-4.9.4_28-3.103.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.9.4_28-3.103.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:xen-4.9.4_28-3.103.1.x86_64" }, "product_reference": "xen-4.9.4_28-3.103.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.9.4_28-3.103.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_28-3.103.1.x86_64" }, "product_reference": "xen-doc-html-4.9.4_28-3.103.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.9.4_28-3.103.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:xen-libs-4.9.4_28-3.103.1.x86_64" }, "product_reference": "xen-libs-4.9.4_28-3.103.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.9.4_28-3.103.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64" }, "product_reference": "xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.9.4_28-3.103.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:xen-tools-4.9.4_28-3.103.1.x86_64" }, "product_reference": "xen-tools-4.9.4_28-3.103.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.9.4_28-3.103.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64" }, "product_reference": "xen-tools-domU-4.9.4_28-3.103.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.9.4_28-3.103.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_28-3.103.1.x86_64" }, "product_reference": "xen-4.9.4_28-3.103.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.9.4_28-3.103.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_28-3.103.1.x86_64" }, "product_reference": "xen-doc-html-4.9.4_28-3.103.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.9.4_28-3.103.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_28-3.103.1.x86_64" }, "product_reference": "xen-libs-4.9.4_28-3.103.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.9.4_28-3.103.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64" }, "product_reference": "xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.9.4_28-3.103.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_28-3.103.1.x86_64" }, "product_reference": "xen-tools-4.9.4_28-3.103.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.9.4_28-3.103.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64" }, "product_reference": "xen-tools-domU-4.9.4_28-3.103.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.9.4_28-3.103.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_28-3.103.1.x86_64" }, "product_reference": "xen-4.9.4_28-3.103.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.9.4_28-3.103.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_28-3.103.1.x86_64" }, "product_reference": "xen-doc-html-4.9.4_28-3.103.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.9.4_28-3.103.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_28-3.103.1.x86_64" }, "product_reference": "xen-libs-4.9.4_28-3.103.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.9.4_28-3.103.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_28-3.103.1.x86_64" }, "product_reference": "xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.9.4_28-3.103.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_28-3.103.1.x86_64" }, "product_reference": "xen-tools-4.9.4_28-3.103.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.9.4_28-3.103.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_28-3.103.1.x86_64" }, "product_reference": "xen-tools-domU-4.9.4_28-3.103.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.9.4_28-3.103.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_28-3.103.1.x86_64" }, "product_reference": "xen-4.9.4_28-3.103.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.9.4_28-3.103.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_28-3.103.1.x86_64" }, "product_reference": "xen-doc-html-4.9.4_28-3.103.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.9.4_28-3.103.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_28-3.103.1.x86_64" }, "product_reference": "xen-libs-4.9.4_28-3.103.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.9.4_28-3.103.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_28-3.103.1.x86_64" }, "product_reference": "xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.9.4_28-3.103.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_28-3.103.1.x86_64" }, "product_reference": "xen-tools-4.9.4_28-3.103.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.9.4_28-3.103.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_28-3.103.1.x86_64" }, "product_reference": "xen-tools-domU-4.9.4_28-3.103.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.9.4_28-3.103.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_28-3.103.1.x86_64" }, "product_reference": "xen-4.9.4_28-3.103.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.9.4_28-3.103.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_28-3.103.1.x86_64" }, "product_reference": "xen-doc-html-4.9.4_28-3.103.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.9.4_28-3.103.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_28-3.103.1.x86_64" }, "product_reference": "xen-libs-4.9.4_28-3.103.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.9.4_28-3.103.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_28-3.103.1.x86_64" }, "product_reference": "xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.9.4_28-3.103.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_28-3.103.1.x86_64" }, "product_reference": "xen-tools-4.9.4_28-3.103.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.9.4_28-3.103.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_28-3.103.1.x86_64" }, "product_reference": "xen-tools-domU-4.9.4_28-3.103.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-26401", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-26401" } ], "notes": [ { "category": "general", "text": "LFENCE/JMP (mitigation V2-2) may not sufficiently mitigate CVE-2017-5715 on some AMD CPUs.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:xen-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-libs-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-tools-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-26401", "url": "https://www.suse.com/security/cve/CVE-2021-26401" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2021-26401", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2021-26401", "url": "https://bugzilla.suse.com/1196901" }, { "category": "external", "summary": "SUSE Bug 1209630 for CVE-2021-26401", "url": "https://bugzilla.suse.com/1209630" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:xen-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-libs-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-tools-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:xen-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-libs-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-tools-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-26T09:19:38Z", "details": "moderate" } ], "title": "CVE-2021-26401" }, { "cve": "CVE-2022-0001", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0001" } ], "notes": [ { "category": "general", "text": "Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:xen-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-libs-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-tools-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0001", "url": "https://www.suse.com/security/cve/CVE-2022-0001" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2022-0001", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2022-0001", "url": "https://bugzilla.suse.com/1196901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:xen-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-libs-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-tools-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:xen-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-libs-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-tools-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-26T09:19:38Z", "details": "moderate" } ], "title": "CVE-2022-0001" }, { "cve": "CVE-2022-0002", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0002" } ], "notes": [ { "category": "general", "text": "Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:xen-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-libs-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-tools-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0002", "url": "https://www.suse.com/security/cve/CVE-2022-0002" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2022-0002", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2022-0002", "url": "https://bugzilla.suse.com/1196901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:xen-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-libs-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-tools-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:xen-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-libs-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-tools-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-26T09:19:38Z", "details": "moderate" } ], "title": "CVE-2022-0002" }, { "cve": "CVE-2022-26356", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-26356" } ], "notes": [ { "category": "general", "text": "Racy interactions between dirty vram tracking and paging log dirty hypercalls Activation of log dirty mode done by XEN_DMOP_track_dirty_vram (was named HVMOP_track_dirty_vram before Xen 4.9) is racy with ongoing log dirty hypercalls. A suitably timed call to XEN_DMOP_track_dirty_vram can enable log dirty while another CPU is still in the process of tearing down the structures related to a previously enabled log dirty mode (XEN_DOMCTL_SHADOW_OP_OFF). This is due to lack of mutually exclusive locking between both operations and can lead to entries being added in already freed slots, resulting in a memory leak.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:xen-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-libs-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-tools-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-26356", "url": "https://www.suse.com/security/cve/CVE-2022-26356" }, { "category": "external", "summary": "SUSE Bug 1197423 for CVE-2022-26356", "url": "https://bugzilla.suse.com/1197423" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:xen-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-libs-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-tools-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:xen-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-libs-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-tools-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-26T09:19:38Z", "details": "moderate" } ], "title": "CVE-2022-26356" }, { "cve": "CVE-2022-26357", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-26357" } ], "notes": [ { "category": "general", "text": "race in VT-d domain ID cleanup Xen domain IDs are up to 15 bits wide. VT-d hardware may allow for only less than 15 bits to hold a domain ID associating a physical device with a particular domain. Therefore internally Xen domain IDs are mapped to the smaller value range. The cleaning up of the housekeeping structures has a race, allowing for VT-d domain IDs to be leaked and flushes to be bypassed.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:xen-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-libs-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-tools-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-26357", "url": "https://www.suse.com/security/cve/CVE-2022-26357" }, { "category": "external", "summary": "SUSE Bug 1197425 for CVE-2022-26357", "url": "https://bugzilla.suse.com/1197425" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:xen-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-libs-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-tools-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:xen-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-libs-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-tools-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-26T09:19:38Z", "details": "moderate" } ], "title": "CVE-2022-26357" }, { "cve": "CVE-2022-26358", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-26358" } ], "notes": [ { "category": "general", "text": "IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Certain PCI devices in a system might be assigned Reserved Memory Regions (specified via Reserved Memory Region Reporting, \"RMRR\") for Intel VT-d or Unity Mapping ranges for AMD-Vi. These are typically used for platform tasks such as legacy USB emulation. Since the precise purpose of these regions is unknown, once a device associated with such a region is active, the mappings of these regions need to remain continuouly accessible by the device. This requirement has been violated. Subsequent DMA or interrupts from the device may have unpredictable behaviour, ranging from IOMMU faults to memory corruption.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:xen-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-libs-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-tools-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-26358", "url": "https://www.suse.com/security/cve/CVE-2022-26358" }, { "category": "external", "summary": "SUSE Bug 1197426 for CVE-2022-26358", "url": "https://bugzilla.suse.com/1197426" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:xen-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-libs-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-tools-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:xen-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-libs-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-tools-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-26T09:19:38Z", "details": "moderate" } ], "title": "CVE-2022-26358" }, { "cve": "CVE-2022-26359", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-26359" } ], "notes": [ { "category": "general", "text": "IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Certain PCI devices in a system might be assigned Reserved Memory Regions (specified via Reserved Memory Region Reporting, \"RMRR\") for Intel VT-d or Unity Mapping ranges for AMD-Vi. These are typically used for platform tasks such as legacy USB emulation. Since the precise purpose of these regions is unknown, once a device associated with such a region is active, the mappings of these regions need to remain continuouly accessible by the device. This requirement has been violated. Subsequent DMA or interrupts from the device may have unpredictable behaviour, ranging from IOMMU faults to memory corruption.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:xen-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-libs-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-tools-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-26359", "url": "https://www.suse.com/security/cve/CVE-2022-26359" }, { "category": "external", "summary": "SUSE Bug 1197426 for CVE-2022-26359", "url": "https://bugzilla.suse.com/1197426" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:xen-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-libs-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-tools-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:xen-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-libs-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-tools-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-26T09:19:38Z", "details": "moderate" } ], "title": "CVE-2022-26359" }, { "cve": "CVE-2022-26360", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-26360" } ], "notes": [ { "category": "general", "text": "IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Certain PCI devices in a system might be assigned Reserved Memory Regions (specified via Reserved Memory Region Reporting, \"RMRR\") for Intel VT-d or Unity Mapping ranges for AMD-Vi. These are typically used for platform tasks such as legacy USB emulation. Since the precise purpose of these regions is unknown, once a device associated with such a region is active, the mappings of these regions need to remain continuouly accessible by the device. This requirement has been violated. Subsequent DMA or interrupts from the device may have unpredictable behaviour, ranging from IOMMU faults to memory corruption.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:xen-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-libs-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-tools-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-26360", "url": "https://www.suse.com/security/cve/CVE-2022-26360" }, { "category": "external", "summary": "SUSE Bug 1197426 for CVE-2022-26360", "url": "https://bugzilla.suse.com/1197426" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:xen-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-libs-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-tools-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:xen-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-libs-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-tools-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-26T09:19:38Z", "details": "moderate" } ], "title": "CVE-2022-26360" }, { "cve": "CVE-2022-26361", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-26361" } ], "notes": [ { "category": "general", "text": "IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Certain PCI devices in a system might be assigned Reserved Memory Regions (specified via Reserved Memory Region Reporting, \"RMRR\") for Intel VT-d or Unity Mapping ranges for AMD-Vi. These are typically used for platform tasks such as legacy USB emulation. Since the precise purpose of these regions is unknown, once a device associated with such a region is active, the mappings of these regions need to remain continuouly accessible by the device. This requirement has been violated. Subsequent DMA or interrupts from the device may have unpredictable behaviour, ranging from IOMMU faults to memory corruption.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:xen-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-libs-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-tools-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-26361", "url": "https://www.suse.com/security/cve/CVE-2022-26361" }, { "category": "external", "summary": "SUSE Bug 1197426 for CVE-2022-26361", "url": "https://bugzilla.suse.com/1197426" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:xen-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-libs-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-tools-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:xen-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-libs-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-tools-4.9.4_28-3.103.1.x86_64", "HPE Helion OpenStack 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_28-3.103.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_28-3.103.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-26T09:19:38Z", "details": "moderate" } ], "title": "CVE-2022-26361" } ] }
suse-su-2022:0759-1
Vulnerability from csaf_suse
Published
2022-03-08 18:06
Modified
2022-03-08 18:06
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.
Transient execution side-channel attacks attacking the Branch History Buffer (BHB),
named 'Branch Target Injection' and 'Intra-Mode Branch History Injection' are now mitigated.
The following security bugs were fixed:
- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).
- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).
- CVE-2022-0847: Fixed a vulnerability were a local attackers could overwrite data in arbitrary (read-only) files (bsc#1196584).
- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)
- CVE-2022-0644: Fixed a denial of service by a local user. A assertion failure could be triggered in kernel_read_file_from_fd() (bsc#1196155).
- CVE-2021-44879: In gc_data_segment() in fs/f2fs/gc.c, special files were not considered, which lead to a move_data_page NULL pointer dereference (bsc#1195987).
- CVE-2022-24959: Fixed a memory leak in yam_siocdevprivate() in drivers/net/hamradio/yam.c (bsc#1195897).
- CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).
- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
- CVE-2022-24448: Fixed an issue in fs/nfs/dir.c. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).
- CVE-2022-25375: The RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command. Attackers can obtain sensitive information from kernel memory (bsc#1196235).
- CVE-2022-0516: Fixed missing check in ioctl related to KVM in s390 allows kernel memory read/write (bsc#1195516).
- CVE-2022-25258: The USB Gadget subsystem lacked certain validation of interface OS descriptor requests, which could have lead to memory corruption (bsc#1196096).
- CVE-2022-24958: drivers/usb/gadget/legacy/inode.c mishandled dev->buf release (bsc#1195905).
The following non-security bugs were fixed:
- btrfs: check for missing device in btrfs_trim_fs (bsc#1195701).
- gve: Add RX context (jsc#SLE-23652).
- gve: Add a jumbo-frame device option (jsc#SLE-23652).
- gve: Add consumed counts to ethtool stats (jsc#SLE-23652).
- gve: Add optional metadata descriptor type GVE_TXD_MTD (jsc#SLE-23652).
- gve: Correct order of processing device options (jsc#SLE-23652).
- gve: Fix GFP flags when allocing pages (jsc#SLE-23652).
- gve: Implement packet continuation for RX (jsc#SLE-23652).
- gve: Implement suspend/resume/shutdown (jsc#SLE-23652).
- gve: Move the irq db indexes out of the ntfy block struct (jsc#SLE-23652).
- gve: Recording rx queue before sending to napi (jsc#SLE-23652).
- gve: Update gve_free_queue_page_list signature (jsc#SLE-23652).
- gve: Use kvcalloc() instead of kvzalloc() (jsc#SLE-23652).
- gve: fix for null pointer dereference (jsc#SLE-23652).
- gve: fix the wrong AdminQ buffer queue index check (jsc#SLE-23652).
- gve: fix unmatched u64_stats_update_end() (jsc#SLE-23652).
- gve: remove memory barrier around seqno (jsc#SLE-23652).
- lib/iov_iter: initialize 'flags' in new pipe_buffer (bsc#1196584).
- net: tipc: validate domain record count on input (bsc#1195254).
- nfsd: allow delegation state ids to be revoked and then freed (bsc#1192483).
- nfsd: allow lock state ids to be revoked and then freed (bsc#1192483).
- nfsd: allow open state ids to be revoked and then freed (bsc#1192483).
- nfsd: do not admin-revoke NSv4.0 state ids (bsc#1192483).
- nfsd: prepare for supporting admin-revocation of state (bsc#1192483).
- powerpc/pseries/ddw: Revert 'Extend upper limit for huge DMA window for persistent memory' (bsc#1195995 ltc#196394).
- scsi: lpfc: Fix pt2pt NVMe PRLI reject LOGO loop (bsc#1189126).
- scsi: target: iscsi: Fix cmd abort fabric stop race (bsc#1195286).
Patchnames
SUSE-2022-759,SUSE-SLE-Module-Live-Patching-15-SP2-2022-759,SUSE-SLE-Product-HA-15-SP2-2022-759,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-759,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-759,SUSE-SLE-Product-RT-15-SP2-2022-759,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-759,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-759,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-759,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-759,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-759,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-759,SUSE-SUSE-MicroOS-5.0-2022-759,SUSE-Storage-7-2022-759
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.\n\n\nTransient execution side-channel attacks attacking the Branch History Buffer (BHB),\nnamed \u0027Branch Target Injection\u0027 and \u0027Intra-Mode Branch History Injection\u0027 are now mitigated.\n\nThe following security bugs were fixed:\n\n- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).\n- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).\n- CVE-2022-0847: Fixed a vulnerability were a local attackers could overwrite data in arbitrary (read-only) files (bsc#1196584).\n- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)\n- CVE-2022-0644: Fixed a denial of service by a local user. A assertion failure could be triggered in kernel_read_file_from_fd() (bsc#1196155).\n- CVE-2021-44879: In gc_data_segment() in fs/f2fs/gc.c, special files were not considered, which lead to a move_data_page NULL pointer dereference (bsc#1195987).\n- CVE-2022-24959: Fixed a memory leak in yam_siocdevprivate() in drivers/net/hamradio/yam.c (bsc#1195897).\n- CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).\n- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).\n- CVE-2022-24448: Fixed an issue in fs/nfs/dir.c. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).\n- CVE-2022-25375: The RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command. Attackers can obtain sensitive information from kernel memory (bsc#1196235).\n- CVE-2022-0516: Fixed missing check in ioctl related to KVM in s390 allows kernel memory read/write (bsc#1195516).\n- CVE-2022-25258: The USB Gadget subsystem lacked certain validation of interface OS descriptor requests, which could have lead to memory corruption (bsc#1196096).\n- CVE-2022-24958: drivers/usb/gadget/legacy/inode.c mishandled dev-\u003ebuf release (bsc#1195905).\n\nThe following non-security bugs were fixed:\n\n- btrfs: check for missing device in btrfs_trim_fs (bsc#1195701).\n- gve: Add RX context (jsc#SLE-23652).\n- gve: Add a jumbo-frame device option (jsc#SLE-23652).\n- gve: Add consumed counts to ethtool stats (jsc#SLE-23652).\n- gve: Add optional metadata descriptor type GVE_TXD_MTD (jsc#SLE-23652).\n- gve: Correct order of processing device options (jsc#SLE-23652).\n- gve: Fix GFP flags when allocing pages (jsc#SLE-23652).\n- gve: Implement packet continuation for RX (jsc#SLE-23652).\n- gve: Implement suspend/resume/shutdown (jsc#SLE-23652).\n- gve: Move the irq db indexes out of the ntfy block struct (jsc#SLE-23652).\n- gve: Recording rx queue before sending to napi (jsc#SLE-23652).\n- gve: Update gve_free_queue_page_list signature (jsc#SLE-23652).\n- gve: Use kvcalloc() instead of kvzalloc() (jsc#SLE-23652).\n- gve: fix for null pointer dereference (jsc#SLE-23652).\n- gve: fix the wrong AdminQ buffer queue index check (jsc#SLE-23652).\n- gve: fix unmatched u64_stats_update_end() (jsc#SLE-23652).\n- gve: remove memory barrier around seqno (jsc#SLE-23652).\n- lib/iov_iter: initialize \u0027flags\u0027 in new pipe_buffer (bsc#1196584).\n- net: tipc: validate domain record count on input (bsc#1195254).\n- nfsd: allow delegation state ids to be revoked and then freed (bsc#1192483).\n- nfsd: allow lock state ids to be revoked and then freed (bsc#1192483).\n- nfsd: allow open state ids to be revoked and then freed (bsc#1192483).\n- nfsd: do not admin-revoke NSv4.0 state ids (bsc#1192483).\n- nfsd: prepare for supporting admin-revocation of state (bsc#1192483).\n- powerpc/pseries/ddw: Revert \u0027Extend upper limit for huge DMA window for persistent memory\u0027 (bsc#1195995 ltc#196394).\n- scsi: lpfc: Fix pt2pt NVMe PRLI reject LOGO loop (bsc#1189126).\n- scsi: target: iscsi: Fix cmd abort fabric stop race (bsc#1195286).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-759,SUSE-SLE-Module-Live-Patching-15-SP2-2022-759,SUSE-SLE-Product-HA-15-SP2-2022-759,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-759,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-759,SUSE-SLE-Product-RT-15-SP2-2022-759,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-759,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-759,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-759,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-759,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-759,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-759,SUSE-SUSE-MicroOS-5.0-2022-759,SUSE-Storage-7-2022-759", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0759-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:0759-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220759-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:0759-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010392.html" }, { "category": "self", "summary": "SUSE Bug 1189126", "url": "https://bugzilla.suse.com/1189126" }, { "category": "self", "summary": "SUSE Bug 1191580", "url": "https://bugzilla.suse.com/1191580" }, { "category": "self", "summary": "SUSE Bug 1192483", "url": "https://bugzilla.suse.com/1192483" }, { "category": "self", "summary": "SUSE Bug 1194516", "url": "https://bugzilla.suse.com/1194516" }, { "category": "self", "summary": "SUSE Bug 1195254", "url": "https://bugzilla.suse.com/1195254" }, { "category": "self", "summary": "SUSE Bug 1195286", "url": "https://bugzilla.suse.com/1195286" }, { "category": "self", "summary": "SUSE Bug 1195516", "url": "https://bugzilla.suse.com/1195516" }, { "category": "self", "summary": "SUSE Bug 1195543", "url": "https://bugzilla.suse.com/1195543" }, { "category": "self", "summary": "SUSE Bug 1195612", "url": "https://bugzilla.suse.com/1195612" }, { "category": "self", "summary": "SUSE Bug 1195701", "url": "https://bugzilla.suse.com/1195701" }, { "category": "self", "summary": "SUSE Bug 1195897", "url": "https://bugzilla.suse.com/1195897" }, { "category": "self", "summary": "SUSE Bug 1195905", "url": "https://bugzilla.suse.com/1195905" }, { "category": "self", "summary": "SUSE Bug 1195908", "url": "https://bugzilla.suse.com/1195908" }, { "category": "self", "summary": "SUSE Bug 1195947", "url": "https://bugzilla.suse.com/1195947" }, { "category": "self", "summary": "SUSE Bug 1195949", "url": "https://bugzilla.suse.com/1195949" }, { "category": "self", "summary": "SUSE Bug 1195987", "url": "https://bugzilla.suse.com/1195987" }, { "category": "self", "summary": "SUSE Bug 1195995", "url": "https://bugzilla.suse.com/1195995" }, { "category": "self", "summary": "SUSE Bug 1196079", "url": "https://bugzilla.suse.com/1196079" }, { "category": "self", "summary": "SUSE Bug 1196095", "url": "https://bugzilla.suse.com/1196095" }, { "category": "self", "summary": "SUSE Bug 1196132", "url": "https://bugzilla.suse.com/1196132" }, { "category": "self", "summary": "SUSE Bug 1196155", "url": "https://bugzilla.suse.com/1196155" }, { "category": "self", "summary": "SUSE Bug 1196235", "url": "https://bugzilla.suse.com/1196235" }, { "category": "self", "summary": "SUSE Bug 1196584", "url": "https://bugzilla.suse.com/1196584" }, { "category": "self", "summary": "SUSE Bug 1196601", "url": "https://bugzilla.suse.com/1196601" }, { "category": "self", "summary": "SUSE Bug 1196612", "url": "https://bugzilla.suse.com/1196612" }, { "category": "self", "summary": "SUSE Bug 1196776", "url": "https://bugzilla.suse.com/1196776" }, { "category": "self", "summary": "SUSE CVE CVE-2021-44879 page", "url": "https://www.suse.com/security/cve/CVE-2021-44879/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0001 page", "url": "https://www.suse.com/security/cve/CVE-2022-0001/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0002 page", "url": "https://www.suse.com/security/cve/CVE-2022-0002/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0487 page", "url": "https://www.suse.com/security/cve/CVE-2022-0487/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0492 page", "url": "https://www.suse.com/security/cve/CVE-2022-0492/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0516 page", "url": "https://www.suse.com/security/cve/CVE-2022-0516/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0617 page", "url": "https://www.suse.com/security/cve/CVE-2022-0617/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0644 page", "url": "https://www.suse.com/security/cve/CVE-2022-0644/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0847 page", "url": "https://www.suse.com/security/cve/CVE-2022-0847/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-24448 page", "url": "https://www.suse.com/security/cve/CVE-2022-24448/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-24958 page", "url": "https://www.suse.com/security/cve/CVE-2022-24958/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-24959 page", "url": "https://www.suse.com/security/cve/CVE-2022-24959/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-25258 page", "url": "https://www.suse.com/security/cve/CVE-2022-25258/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-25375 page", "url": "https://www.suse.com/security/cve/CVE-2022-25375/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2022-03-08T18:06:15Z", "generator": { "date": "2022-03-08T18:06:15Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:0759-1", "initial_release_date": "2022-03-08T18:06:15Z", "revision_history": [ { "date": "2022-03-08T18:06:15Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "product": { "name": "cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "product_id": "cluster-md-kmp-default-5.3.18-24.107.1.aarch64" } }, { "category": "product_version", "name": "cluster-md-kmp-preempt-5.3.18-24.107.1.aarch64", "product": { "name": "cluster-md-kmp-preempt-5.3.18-24.107.1.aarch64", "product_id": "cluster-md-kmp-preempt-5.3.18-24.107.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-5.3.18-24.107.1.aarch64", "product": { "name": "dlm-kmp-default-5.3.18-24.107.1.aarch64", "product_id": "dlm-kmp-default-5.3.18-24.107.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-preempt-5.3.18-24.107.1.aarch64", "product": { "name": "dlm-kmp-preempt-5.3.18-24.107.1.aarch64", "product_id": "dlm-kmp-preempt-5.3.18-24.107.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.3.18-24.107.1.aarch64", "product": { "name": "gfs2-kmp-default-5.3.18-24.107.1.aarch64", "product_id": "gfs2-kmp-default-5.3.18-24.107.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-preempt-5.3.18-24.107.1.aarch64", "product": { "name": "gfs2-kmp-preempt-5.3.18-24.107.1.aarch64", "product_id": "gfs2-kmp-preempt-5.3.18-24.107.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-5.3.18-24.107.1.aarch64", "product": { "name": "kernel-default-5.3.18-24.107.1.aarch64", "product_id": "kernel-default-5.3.18-24.107.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "product": { "name": "kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "product_id": "kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.3.18-24.107.1.9.50.2.aarch64", "product": { "name": "kernel-default-base-rebuild-5.3.18-24.107.1.9.50.2.aarch64", "product_id": "kernel-default-base-rebuild-5.3.18-24.107.1.9.50.2.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-5.3.18-24.107.1.aarch64", "product": { "name": "kernel-default-devel-5.3.18-24.107.1.aarch64", "product_id": "kernel-default-devel-5.3.18-24.107.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-5.3.18-24.107.1.aarch64", "product": { "name": "kernel-default-extra-5.3.18-24.107.1.aarch64", "product_id": "kernel-default-extra-5.3.18-24.107.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.3.18-24.107.1.aarch64", "product": { "name": "kernel-default-livepatch-5.3.18-24.107.1.aarch64", "product_id": "kernel-default-livepatch-5.3.18-24.107.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.3.18-24.107.1.aarch64", "product": { "name": "kernel-default-livepatch-devel-5.3.18-24.107.1.aarch64", "product_id": "kernel-default-livepatch-devel-5.3.18-24.107.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-5.3.18-24.107.1.aarch64", "product": { "name": "kernel-obs-build-5.3.18-24.107.1.aarch64", "product_id": "kernel-obs-build-5.3.18-24.107.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-5.3.18-24.107.1.aarch64", "product": { "name": "kernel-obs-qa-5.3.18-24.107.1.aarch64", "product_id": "kernel-obs-qa-5.3.18-24.107.1.aarch64" } }, { "category": "product_version", "name": "kernel-preempt-5.3.18-24.107.1.aarch64", "product": { "name": "kernel-preempt-5.3.18-24.107.1.aarch64", "product_id": "kernel-preempt-5.3.18-24.107.1.aarch64" } }, { "category": "product_version", "name": "kernel-preempt-devel-5.3.18-24.107.1.aarch64", "product": { "name": "kernel-preempt-devel-5.3.18-24.107.1.aarch64", "product_id": "kernel-preempt-devel-5.3.18-24.107.1.aarch64" } }, { "category": "product_version", "name": "kernel-preempt-extra-5.3.18-24.107.1.aarch64", "product": { "name": "kernel-preempt-extra-5.3.18-24.107.1.aarch64", "product_id": "kernel-preempt-extra-5.3.18-24.107.1.aarch64" } }, { "category": "product_version", "name": "kernel-preempt-livepatch-devel-5.3.18-24.107.1.aarch64", "product": { "name": "kernel-preempt-livepatch-devel-5.3.18-24.107.1.aarch64", "product_id": "kernel-preempt-livepatch-devel-5.3.18-24.107.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-5.3.18-24.107.1.aarch64", "product": { "name": "kernel-syms-5.3.18-24.107.1.aarch64", "product_id": "kernel-syms-5.3.18-24.107.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.3.18-24.107.1.aarch64", "product": { "name": "kselftests-kmp-default-5.3.18-24.107.1.aarch64", "product_id": "kselftests-kmp-default-5.3.18-24.107.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-preempt-5.3.18-24.107.1.aarch64", "product": { "name": "kselftests-kmp-preempt-5.3.18-24.107.1.aarch64", "product_id": "kselftests-kmp-preempt-5.3.18-24.107.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "product": { "name": "ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "product_id": "ocfs2-kmp-default-5.3.18-24.107.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-preempt-5.3.18-24.107.1.aarch64", "product": { "name": "ocfs2-kmp-preempt-5.3.18-24.107.1.aarch64", "product_id": "ocfs2-kmp-preempt-5.3.18-24.107.1.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "product": { "name": "reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "product_id": "reiserfs-kmp-default-5.3.18-24.107.1.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-preempt-5.3.18-24.107.1.aarch64", "product": { "name": "reiserfs-kmp-preempt-5.3.18-24.107.1.aarch64", "product_id": "reiserfs-kmp-preempt-5.3.18-24.107.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-5.3.18-24.107.1.noarch", "product": { "name": "kernel-devel-5.3.18-24.107.1.noarch", "product_id": "kernel-devel-5.3.18-24.107.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-5.3.18-24.107.1.noarch", "product": { "name": "kernel-docs-5.3.18-24.107.1.noarch", "product_id": "kernel-docs-5.3.18-24.107.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-5.3.18-24.107.1.noarch", "product": { "name": "kernel-docs-html-5.3.18-24.107.1.noarch", "product_id": "kernel-docs-html-5.3.18-24.107.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-5.3.18-24.107.1.noarch", "product": { "name": "kernel-macros-5.3.18-24.107.1.noarch", "product_id": "kernel-macros-5.3.18-24.107.1.noarch" } }, { "category": "product_version", "name": "kernel-source-5.3.18-24.107.1.noarch", "product": { "name": "kernel-source-5.3.18-24.107.1.noarch", "product_id": "kernel-source-5.3.18-24.107.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-5.3.18-24.107.1.noarch", "product": { "name": "kernel-source-vanilla-5.3.18-24.107.1.noarch", "product_id": "kernel-source-vanilla-5.3.18-24.107.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "product": { "name": "cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "product_id": "cluster-md-kmp-default-5.3.18-24.107.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-5.3.18-24.107.1.ppc64le", "product": { "name": "dlm-kmp-default-5.3.18-24.107.1.ppc64le", "product_id": "dlm-kmp-default-5.3.18-24.107.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "product": { "name": "gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "product_id": "gfs2-kmp-default-5.3.18-24.107.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-5.3.18-24.107.1.ppc64le", "product": { "name": "kernel-debug-5.3.18-24.107.1.ppc64le", "product_id": "kernel-debug-5.3.18-24.107.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-5.3.18-24.107.1.ppc64le", "product": { "name": "kernel-debug-devel-5.3.18-24.107.1.ppc64le", "product_id": "kernel-debug-devel-5.3.18-24.107.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-5.3.18-24.107.1.ppc64le", "product": { "name": "kernel-debug-livepatch-devel-5.3.18-24.107.1.ppc64le", "product_id": "kernel-debug-livepatch-devel-5.3.18-24.107.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-5.3.18-24.107.1.ppc64le", "product": { "name": "kernel-default-5.3.18-24.107.1.ppc64le", "product_id": "kernel-default-5.3.18-24.107.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "product": { "name": "kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "product_id": "kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.3.18-24.107.1.9.50.2.ppc64le", "product": { "name": "kernel-default-base-rebuild-5.3.18-24.107.1.9.50.2.ppc64le", "product_id": "kernel-default-base-rebuild-5.3.18-24.107.1.9.50.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-5.3.18-24.107.1.ppc64le", "product": { "name": "kernel-default-devel-5.3.18-24.107.1.ppc64le", "product_id": "kernel-default-devel-5.3.18-24.107.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-5.3.18-24.107.1.ppc64le", "product": { "name": "kernel-default-extra-5.3.18-24.107.1.ppc64le", "product_id": "kernel-default-extra-5.3.18-24.107.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "product": { "name": "kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "product_id": "kernel-default-livepatch-5.3.18-24.107.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "product": { "name": "kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "product_id": "kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le" } }, { "category": "product_version", "name": "kernel-kvmsmall-5.3.18-24.107.1.ppc64le", "product": { "name": "kernel-kvmsmall-5.3.18-24.107.1.ppc64le", "product_id": "kernel-kvmsmall-5.3.18-24.107.1.ppc64le" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-5.3.18-24.107.1.ppc64le", "product": { "name": "kernel-kvmsmall-devel-5.3.18-24.107.1.ppc64le", "product_id": "kernel-kvmsmall-devel-5.3.18-24.107.1.ppc64le" } }, { "category": "product_version", "name": "kernel-kvmsmall-livepatch-devel-5.3.18-24.107.1.ppc64le", "product": { "name": "kernel-kvmsmall-livepatch-devel-5.3.18-24.107.1.ppc64le", "product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-24.107.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "product_id": "kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-5.3.18-24.107.1.ppc64le", "product": { "name": "kernel-obs-build-5.3.18-24.107.1.ppc64le", "product_id": "kernel-obs-build-5.3.18-24.107.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-5.3.18-24.107.1.ppc64le", "product": { "name": "kernel-obs-qa-5.3.18-24.107.1.ppc64le", "product_id": "kernel-obs-qa-5.3.18-24.107.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-5.3.18-24.107.1.ppc64le", "product": { "name": "kernel-syms-5.3.18-24.107.1.ppc64le", "product_id": "kernel-syms-5.3.18-24.107.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.3.18-24.107.1.ppc64le", "product": { "name": "kselftests-kmp-default-5.3.18-24.107.1.ppc64le", "product_id": "kselftests-kmp-default-5.3.18-24.107.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "product": { "name": "ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "product_id": "ocfs2-kmp-default-5.3.18-24.107.1.ppc64le" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "product": { "name": "reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "product_id": "reiserfs-kmp-default-5.3.18-24.107.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-5.3.18-24.107.1.s390x", "product": { "name": "cluster-md-kmp-default-5.3.18-24.107.1.s390x", "product_id": "cluster-md-kmp-default-5.3.18-24.107.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-5.3.18-24.107.1.s390x", "product": { "name": "dlm-kmp-default-5.3.18-24.107.1.s390x", "product_id": "dlm-kmp-default-5.3.18-24.107.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.3.18-24.107.1.s390x", "product": { "name": "gfs2-kmp-default-5.3.18-24.107.1.s390x", "product_id": "gfs2-kmp-default-5.3.18-24.107.1.s390x" } }, { "category": "product_version", "name": "kernel-default-5.3.18-24.107.1.s390x", "product": { "name": "kernel-default-5.3.18-24.107.1.s390x", "product_id": "kernel-default-5.3.18-24.107.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "product": { "name": "kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "product_id": "kernel-default-base-5.3.18-24.107.1.9.50.2.s390x" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.3.18-24.107.1.9.50.2.s390x", "product": { "name": "kernel-default-base-rebuild-5.3.18-24.107.1.9.50.2.s390x", "product_id": "kernel-default-base-rebuild-5.3.18-24.107.1.9.50.2.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-5.3.18-24.107.1.s390x", "product": { "name": "kernel-default-devel-5.3.18-24.107.1.s390x", "product_id": "kernel-default-devel-5.3.18-24.107.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-5.3.18-24.107.1.s390x", "product": { "name": "kernel-default-extra-5.3.18-24.107.1.s390x", "product_id": "kernel-default-extra-5.3.18-24.107.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.3.18-24.107.1.s390x", "product": { "name": "kernel-default-livepatch-5.3.18-24.107.1.s390x", "product_id": "kernel-default-livepatch-5.3.18-24.107.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "product": { "name": "kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "product_id": "kernel-default-livepatch-devel-5.3.18-24.107.1.s390x" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "product": { "name": "kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "product_id": "kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-5.3.18-24.107.1.s390x", "product": { "name": "kernel-obs-build-5.3.18-24.107.1.s390x", "product_id": "kernel-obs-build-5.3.18-24.107.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-5.3.18-24.107.1.s390x", "product": { "name": "kernel-obs-qa-5.3.18-24.107.1.s390x", "product_id": "kernel-obs-qa-5.3.18-24.107.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-5.3.18-24.107.1.s390x", "product": { "name": "kernel-syms-5.3.18-24.107.1.s390x", "product_id": "kernel-syms-5.3.18-24.107.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-5.3.18-24.107.1.s390x", "product": { "name": "kernel-zfcpdump-5.3.18-24.107.1.s390x", "product_id": "kernel-zfcpdump-5.3.18-24.107.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.3.18-24.107.1.s390x", "product": { "name": "kselftests-kmp-default-5.3.18-24.107.1.s390x", "product_id": "kselftests-kmp-default-5.3.18-24.107.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.3.18-24.107.1.s390x", "product": { "name": "ocfs2-kmp-default-5.3.18-24.107.1.s390x", "product_id": "ocfs2-kmp-default-5.3.18-24.107.1.s390x" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.3.18-24.107.1.s390x", "product": { "name": "reiserfs-kmp-default-5.3.18-24.107.1.s390x", "product_id": "reiserfs-kmp-default-5.3.18-24.107.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "product": { "name": "cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "product_id": "cluster-md-kmp-default-5.3.18-24.107.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-preempt-5.3.18-24.107.1.x86_64", "product": { "name": "cluster-md-kmp-preempt-5.3.18-24.107.1.x86_64", "product_id": "cluster-md-kmp-preempt-5.3.18-24.107.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-5.3.18-24.107.1.x86_64", "product": { "name": "dlm-kmp-default-5.3.18-24.107.1.x86_64", "product_id": "dlm-kmp-default-5.3.18-24.107.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-preempt-5.3.18-24.107.1.x86_64", "product": { "name": "dlm-kmp-preempt-5.3.18-24.107.1.x86_64", "product_id": "dlm-kmp-preempt-5.3.18-24.107.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.3.18-24.107.1.x86_64", "product": { "name": "gfs2-kmp-default-5.3.18-24.107.1.x86_64", "product_id": "gfs2-kmp-default-5.3.18-24.107.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-preempt-5.3.18-24.107.1.x86_64", "product": { "name": "gfs2-kmp-preempt-5.3.18-24.107.1.x86_64", "product_id": "gfs2-kmp-preempt-5.3.18-24.107.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-5.3.18-24.107.1.x86_64", "product": { "name": "kernel-debug-5.3.18-24.107.1.x86_64", "product_id": "kernel-debug-5.3.18-24.107.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-5.3.18-24.107.1.x86_64", "product": { "name": "kernel-debug-devel-5.3.18-24.107.1.x86_64", "product_id": "kernel-debug-devel-5.3.18-24.107.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-5.3.18-24.107.1.x86_64", "product": { "name": "kernel-debug-livepatch-devel-5.3.18-24.107.1.x86_64", "product_id": "kernel-debug-livepatch-devel-5.3.18-24.107.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-5.3.18-24.107.1.x86_64", "product": { "name": "kernel-default-5.3.18-24.107.1.x86_64", "product_id": "kernel-default-5.3.18-24.107.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "product": { "name": "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "product_id": "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.3.18-24.107.1.9.50.2.x86_64", "product": { "name": "kernel-default-base-rebuild-5.3.18-24.107.1.9.50.2.x86_64", "product_id": "kernel-default-base-rebuild-5.3.18-24.107.1.9.50.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-5.3.18-24.107.1.x86_64", "product": { "name": "kernel-default-devel-5.3.18-24.107.1.x86_64", "product_id": "kernel-default-devel-5.3.18-24.107.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-5.3.18-24.107.1.x86_64", "product": { "name": "kernel-default-extra-5.3.18-24.107.1.x86_64", "product_id": "kernel-default-extra-5.3.18-24.107.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.3.18-24.107.1.x86_64", "product": { "name": "kernel-default-livepatch-5.3.18-24.107.1.x86_64", "product_id": "kernel-default-livepatch-5.3.18-24.107.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "product": { "name": "kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "product_id": "kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-5.3.18-24.107.1.x86_64", "product": { "name": "kernel-kvmsmall-5.3.18-24.107.1.x86_64", "product_id": "kernel-kvmsmall-5.3.18-24.107.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-5.3.18-24.107.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-5.3.18-24.107.1.x86_64", "product_id": "kernel-kvmsmall-devel-5.3.18-24.107.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-livepatch-devel-5.3.18-24.107.1.x86_64", "product": { "name": "kernel-kvmsmall-livepatch-devel-5.3.18-24.107.1.x86_64", "product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-24.107.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "product": { "name": "kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "product_id": "kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_107-preempt-1-5.5.1.x86_64", "product": { "name": "kernel-livepatch-5_3_18-24_107-preempt-1-5.5.1.x86_64", "product_id": "kernel-livepatch-5_3_18-24_107-preempt-1-5.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-5.3.18-24.107.1.x86_64", "product": { "name": "kernel-obs-build-5.3.18-24.107.1.x86_64", "product_id": "kernel-obs-build-5.3.18-24.107.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-5.3.18-24.107.1.x86_64", "product": { "name": "kernel-obs-qa-5.3.18-24.107.1.x86_64", "product_id": "kernel-obs-qa-5.3.18-24.107.1.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-5.3.18-24.107.1.x86_64", "product": { "name": "kernel-preempt-5.3.18-24.107.1.x86_64", "product_id": "kernel-preempt-5.3.18-24.107.1.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-devel-5.3.18-24.107.1.x86_64", "product": { "name": "kernel-preempt-devel-5.3.18-24.107.1.x86_64", "product_id": "kernel-preempt-devel-5.3.18-24.107.1.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-extra-5.3.18-24.107.1.x86_64", "product": { "name": "kernel-preempt-extra-5.3.18-24.107.1.x86_64", "product_id": "kernel-preempt-extra-5.3.18-24.107.1.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-livepatch-devel-5.3.18-24.107.1.x86_64", "product": { "name": "kernel-preempt-livepatch-devel-5.3.18-24.107.1.x86_64", "product_id": "kernel-preempt-livepatch-devel-5.3.18-24.107.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-5.3.18-24.107.1.x86_64", "product": { "name": "kernel-syms-5.3.18-24.107.1.x86_64", "product_id": "kernel-syms-5.3.18-24.107.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.3.18-24.107.1.x86_64", "product": { "name": "kselftests-kmp-default-5.3.18-24.107.1.x86_64", "product_id": "kselftests-kmp-default-5.3.18-24.107.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-preempt-5.3.18-24.107.1.x86_64", "product": { "name": "kselftests-kmp-preempt-5.3.18-24.107.1.x86_64", "product_id": "kselftests-kmp-preempt-5.3.18-24.107.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "product": { "name": "ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "product_id": "ocfs2-kmp-default-5.3.18-24.107.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-preempt-5.3.18-24.107.1.x86_64", "product": { "name": "ocfs2-kmp-preempt-5.3.18-24.107.1.x86_64", "product_id": "ocfs2-kmp-preempt-5.3.18-24.107.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "product": { "name": "reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "product_id": "reiserfs-kmp-default-5.3.18-24.107.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-preempt-5.3.18-24.107.1.x86_64", "product": { "name": "reiserfs-kmp-preempt-5.3.18-24.107.1.x86_64", "product_id": "reiserfs-kmp-preempt-5.3.18-24.107.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 15 SP2", "product": { "name": "SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Real Time 15 SP2", "product": { "name": "SUSE Linux Enterprise Real Time 15 SP2", "product_id": "SUSE Linux Enterprise Real Time 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_rt:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP2-BCL", "product": { "name": "SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_bcl:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp2" } } }, { "category": "product_name", "name": "SUSE Manager Proxy 4.1", "product": { "name": "SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-proxy:4.1" } } }, { "category": "product_name", "name": "SUSE Manager Retail Branch Server 4.1", "product": { "name": "SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-retail-branch-server:4.1" } } }, { "category": "product_name", "name": "SUSE Manager Server 4.1", "product": { "name": "SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-server:4.1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.0", "product": { "name": "SUSE Linux Enterprise Micro 5.0", "product_id": "SUSE Linux Enterprise Micro 5.0", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-microos:5.0" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 7", "product": { "name": "SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:7" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-5.3.18-24.107.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le" }, "product_reference": "kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-5.3.18-24.107.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x" }, "product_reference": "kernel-default-livepatch-5.3.18-24.107.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-default-livepatch-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le" }, "product_reference": "kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-5.3.18-24.107.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x" }, "product_reference": "kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64" }, "product_reference": "cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.3.18-24.107.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.3.18-24.107.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x" }, "product_reference": "cluster-md-kmp-default-5.3.18-24.107.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64" }, "product_reference": "cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64" }, "product_reference": "dlm-kmp-default-5.3.18-24.107.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.3.18-24.107.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le" }, "product_reference": "dlm-kmp-default-5.3.18-24.107.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.3.18-24.107.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x" }, "product_reference": "dlm-kmp-default-5.3.18-24.107.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64" }, "product_reference": "dlm-kmp-default-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64" }, "product_reference": "gfs2-kmp-default-5.3.18-24.107.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.3.18-24.107.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le" }, "product_reference": "gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.3.18-24.107.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x" }, "product_reference": "gfs2-kmp-default-5.3.18-24.107.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64" }, "product_reference": "gfs2-kmp-default-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64" }, "product_reference": "ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.3.18-24.107.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.3.18-24.107.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x" }, "product_reference": "ocfs2-kmp-default-5.3.18-24.107.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64" }, "product_reference": "ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64" }, "product_reference": "kernel-default-5.3.18-24.107.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-default-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64" }, "product_reference": "kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64" }, "product_reference": "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64" }, "product_reference": "kernel-default-devel-5.3.18-24.107.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-default-devel-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-devel-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-docs-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-macros-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64" }, "product_reference": "kernel-obs-build-5.3.18-24.107.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-obs-build-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64" }, "product_reference": "kernel-preempt-5.3.18-24.107.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-preempt-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64" }, "product_reference": "kernel-preempt-devel-5.3.18-24.107.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-preempt-devel-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-source-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64" }, "product_reference": "kernel-syms-5.3.18-24.107.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-syms-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64" }, "product_reference": "kernel-default-5.3.18-24.107.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-default-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64" }, "product_reference": "kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64" }, "product_reference": "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64" }, "product_reference": "kernel-default-devel-5.3.18-24.107.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-default-devel-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-devel-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-docs-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-macros-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64" }, "product_reference": "kernel-obs-build-5.3.18-24.107.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-obs-build-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64" }, "product_reference": "kernel-preempt-5.3.18-24.107.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-preempt-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64" }, "product_reference": "kernel-preempt-devel-5.3.18-24.107.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-preempt-devel-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-source-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64" }, "product_reference": "kernel-syms-5.3.18-24.107.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-syms-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP2", "product_id": "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-default-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP2", "product_id": "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64" }, "product_reference": "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP2", "product_id": "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-default-devel-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise Real Time 15 SP2", "product_id": "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-devel-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise Real Time 15 SP2", "product_id": "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-docs-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise Real Time 15 SP2", "product_id": "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-macros-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP2", "product_id": "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-obs-build-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP2", "product_id": "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-preempt-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP2", "product_id": "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-preempt-devel-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise Real Time 15 SP2", "product_id": "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-source-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP2", "product_id": "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-syms-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-default-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64" }, "product_reference": "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-default-devel-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-devel-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-docs-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-macros-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-obs-build-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-preempt-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-preempt-devel-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-source-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-syms-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64" }, "product_reference": "kernel-default-5.3.18-24.107.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-24.107.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le" }, "product_reference": "kernel-default-5.3.18-24.107.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-24.107.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x" }, "product_reference": "kernel-default-5.3.18-24.107.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-default-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64" }, "product_reference": "kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le" }, "product_reference": "kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-24.107.1.9.50.2.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x" }, "product_reference": "kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64" }, "product_reference": "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64" }, "product_reference": "kernel-default-devel-5.3.18-24.107.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-24.107.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le" }, "product_reference": "kernel-default-devel-5.3.18-24.107.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-24.107.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x" }, "product_reference": "kernel-default-devel-5.3.18-24.107.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-default-devel-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-devel-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-docs-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-macros-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64" }, "product_reference": "kernel-obs-build-5.3.18-24.107.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-24.107.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le" }, "product_reference": "kernel-obs-build-5.3.18-24.107.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-24.107.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x" }, "product_reference": "kernel-obs-build-5.3.18-24.107.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-obs-build-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64" }, "product_reference": "kernel-preempt-5.3.18-24.107.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-preempt-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64" }, "product_reference": "kernel-preempt-devel-5.3.18-24.107.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-preempt-devel-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-source-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64" }, "product_reference": "kernel-syms-5.3.18-24.107.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-24.107.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le" }, "product_reference": "kernel-syms-5.3.18-24.107.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-24.107.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x" }, "product_reference": "kernel-syms-5.3.18-24.107.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-syms-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64" }, "product_reference": "reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-24.107.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-24.107.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x" }, "product_reference": "reiserfs-kmp-default-5.3.18-24.107.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" }, "product_reference": "reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-24.107.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le" }, "product_reference": "kernel-default-5.3.18-24.107.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-default-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le" }, "product_reference": "kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64" }, "product_reference": "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-24.107.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le" }, "product_reference": "kernel-default-devel-5.3.18-24.107.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-default-devel-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-devel-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-docs-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-macros-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-24.107.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le" }, "product_reference": "kernel-obs-build-5.3.18-24.107.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-obs-build-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-preempt-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-preempt-devel-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.3.18-24.107.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-source-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-24.107.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le" }, "product_reference": "kernel-syms-5.3.18-24.107.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-syms-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-24.107.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" }, "product_reference": "reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-24.107.1.x86_64 as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-default-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64 as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64" }, "product_reference": "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-24.107.1.x86_64 as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-default-devel-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.3.18-24.107.1.noarch as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-devel-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-5.3.18-24.107.1.noarch as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-docs-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.3.18-24.107.1.noarch as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-macros-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-24.107.1.x86_64 as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-obs-build-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-24.107.1.x86_64 as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-preempt-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-24.107.1.x86_64 as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-preempt-devel-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.3.18-24.107.1.noarch as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-source-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-24.107.1.x86_64 as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-syms-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-24.107.1.x86_64 as component of SUSE Manager Proxy 4.1", "product_id": "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" }, "product_reference": "reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-24.107.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-default-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64 as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64" }, "product_reference": "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-24.107.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-default-devel-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.3.18-24.107.1.noarch as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-devel-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-5.3.18-24.107.1.noarch as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-docs-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.3.18-24.107.1.noarch as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-macros-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-24.107.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-obs-build-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-24.107.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-preempt-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-24.107.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-preempt-devel-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.3.18-24.107.1.noarch as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-source-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-24.107.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-syms-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-24.107.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", "product_id": "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" }, "product_reference": "reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-24.107.1.ppc64le as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le" }, "product_reference": "kernel-default-5.3.18-24.107.1.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-24.107.1.s390x as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x" }, "product_reference": "kernel-default-5.3.18-24.107.1.s390x", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-24.107.1.x86_64 as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-default-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le" }, "product_reference": "kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-24.107.1.9.50.2.s390x as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x" }, "product_reference": "kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64 as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64" }, "product_reference": "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-24.107.1.ppc64le as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le" }, "product_reference": "kernel-default-devel-5.3.18-24.107.1.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-24.107.1.s390x as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x" }, "product_reference": "kernel-default-devel-5.3.18-24.107.1.s390x", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-24.107.1.x86_64 as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-default-devel-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.3.18-24.107.1.noarch as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-devel-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-5.3.18-24.107.1.noarch as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-docs-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.3.18-24.107.1.noarch as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-macros-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-24.107.1.ppc64le as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le" }, "product_reference": "kernel-obs-build-5.3.18-24.107.1.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-24.107.1.s390x as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x" }, "product_reference": "kernel-obs-build-5.3.18-24.107.1.s390x", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-24.107.1.x86_64 as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-obs-build-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-24.107.1.x86_64 as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-preempt-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-24.107.1.x86_64 as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-preempt-devel-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.3.18-24.107.1.noarch as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-source-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-24.107.1.ppc64le as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le" }, "product_reference": "kernel-syms-5.3.18-24.107.1.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-24.107.1.s390x as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x" }, "product_reference": "kernel-syms-5.3.18-24.107.1.s390x", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-24.107.1.x86_64 as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-syms-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-24.107.1.ppc64le as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-24.107.1.s390x as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x" }, "product_reference": "reiserfs-kmp-default-5.3.18-24.107.1.s390x", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-24.107.1.x86_64 as component of SUSE Manager Server 4.1", "product_id": "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" }, "product_reference": "reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-24.107.1.aarch64 as component of SUSE Linux Enterprise Micro 5.0", "product_id": "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64" }, "product_reference": "kernel-default-5.3.18-24.107.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-24.107.1.x86_64 as component of SUSE Linux Enterprise Micro 5.0", "product_id": "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-default-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64 as component of SUSE Linux Enterprise Micro 5.0", "product_id": "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64" }, "product_reference": "kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64 as component of SUSE Linux Enterprise Micro 5.0", "product_id": "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64" }, "product_reference": "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-24.107.1.aarch64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64" }, "product_reference": "kernel-default-5.3.18-24.107.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-24.107.1.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-default-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64" }, "product_reference": "kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64" }, "product_reference": "kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-24.107.1.aarch64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64" }, "product_reference": "kernel-default-devel-5.3.18-24.107.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-24.107.1.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-default-devel-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.3.18-24.107.1.noarch as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-devel-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-5.3.18-24.107.1.noarch as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-docs-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.3.18-24.107.1.noarch as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-macros-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-24.107.1.aarch64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64" }, "product_reference": "kernel-obs-build-5.3.18-24.107.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-24.107.1.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-obs-build-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-24.107.1.aarch64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64" }, "product_reference": "kernel-preempt-5.3.18-24.107.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-24.107.1.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-preempt-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-24.107.1.aarch64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64" }, "product_reference": "kernel-preempt-devel-5.3.18-24.107.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-24.107.1.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-preempt-devel-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.3.18-24.107.1.noarch as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch" }, "product_reference": "kernel-source-5.3.18-24.107.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-24.107.1.aarch64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64" }, "product_reference": "kernel-syms-5.3.18-24.107.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-24.107.1.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64" }, "product_reference": "kernel-syms-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-24.107.1.aarch64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64" }, "product_reference": "reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-24.107.1.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" }, "product_reference": "reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-44879", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-44879" } ], "notes": [ { "category": "general", "text": "In gc_data_segment in fs/f2fs/gc.c in the Linux kernel before 5.16.3, special files are not considered, leading to a move_data_page NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-44879", "url": "https://www.suse.com/security/cve/CVE-2021-44879" }, { "category": "external", "summary": "SUSE Bug 1195987 for CVE-2021-44879", "url": "https://bugzilla.suse.com/1195987" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:06:15Z", "details": "moderate" } ], "title": "CVE-2021-44879" }, { "cve": "CVE-2022-0001", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0001" } ], "notes": [ { "category": "general", "text": "Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0001", "url": "https://www.suse.com/security/cve/CVE-2022-0001" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2022-0001", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2022-0001", "url": "https://bugzilla.suse.com/1196901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:06:15Z", "details": "moderate" } ], "title": "CVE-2022-0001" }, { "cve": "CVE-2022-0002", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0002" } ], "notes": [ { "category": "general", "text": "Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0002", "url": "https://www.suse.com/security/cve/CVE-2022-0002" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2022-0002", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2022-0002", "url": "https://bugzilla.suse.com/1196901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:06:15Z", "details": "moderate" } ], "title": "CVE-2022-0002" }, { "cve": "CVE-2022-0487", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0487" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove in drivers/memstick/host/rtsx_usb_ms.c in memstick in the Linux kernel. In this flaw, a local attacker with a user privilege may impact system Confidentiality. This flaw affects kernel versions prior to 5.14 rc1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0487", "url": "https://www.suse.com/security/cve/CVE-2022-0487" }, { "category": "external", "summary": "SUSE Bug 1194516 for CVE-2022-0487", "url": "https://bugzilla.suse.com/1194516" }, { "category": "external", "summary": "SUSE Bug 1195949 for CVE-2022-0487", "url": "https://bugzilla.suse.com/1195949" }, { "category": "external", "summary": "SUSE Bug 1198615 for CVE-2022-0487", "url": "https://bugzilla.suse.com/1198615" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:06:15Z", "details": "moderate" } ], "title": "CVE-2022-0487" }, { "cve": "CVE-2022-0492", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0492" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in the Linux kernel\u0027s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0492", "url": "https://www.suse.com/security/cve/CVE-2022-0492" }, { "category": "external", "summary": "SUSE Bug 1195543 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1195543" }, { "category": "external", "summary": "SUSE Bug 1195908 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1195908" }, { "category": "external", "summary": "SUSE Bug 1196612 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1196612" }, { "category": "external", "summary": "SUSE Bug 1196776 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1196776" }, { "category": "external", "summary": "SUSE Bug 1198615 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1198615" }, { "category": "external", "summary": "SUSE Bug 1199255 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1199255" }, { "category": "external", "summary": "SUSE Bug 1199615 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1199615" }, { "category": "external", "summary": "SUSE Bug 1200084 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1200084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:06:15Z", "details": "moderate" } ], "title": "CVE-2022-0492" }, { "cve": "CVE-2022-0516", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0516" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in kvm_s390_guest_sida_op in the arch/s390/kvm/kvm-s390.c function in KVM for s390 in the Linux kernel. This flaw allows a local attacker with a normal user privilege to obtain unauthorized memory write access. This flaw affects Linux kernel versions prior to 5.17-rc4.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0516", "url": "https://www.suse.com/security/cve/CVE-2022-0516" }, { "category": "external", "summary": "SUSE Bug 1195516 for CVE-2022-0516", "url": "https://bugzilla.suse.com/1195516" }, { "category": "external", "summary": "SUSE Bug 1195947 for CVE-2022-0516", "url": "https://bugzilla.suse.com/1195947" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:06:15Z", "details": "important" } ], "title": "CVE-2022-0516" }, { "cve": "CVE-2022-0617", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0617" } ], "notes": [ { "category": "general", "text": "A flaw null pointer dereference in the Linux kernel UDF file system functionality was found in the way user triggers udf_file_write_iter function for the malicious UDF image. A local user could use this flaw to crash the system. Actual from Linux kernel 4.2-rc1 till 5.17-rc2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0617", "url": "https://www.suse.com/security/cve/CVE-2022-0617" }, { "category": "external", "summary": "SUSE Bug 1196079 for CVE-2022-0617", "url": "https://bugzilla.suse.com/1196079" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:06:15Z", "details": "moderate" } ], "title": "CVE-2022-0617" }, { "cve": "CVE-2022-0644", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0644" } ], "notes": [ { "category": "general", "text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0644", "url": "https://www.suse.com/security/cve/CVE-2022-0644" }, { "category": "external", "summary": "SUSE Bug 1196155 for CVE-2022-0644", "url": "https://bugzilla.suse.com/1196155" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:06:15Z", "details": "moderate" } ], "title": "CVE-2022-0644" }, { "cve": "CVE-2022-0847", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0847" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way the \"flags\" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0847", "url": "https://www.suse.com/security/cve/CVE-2022-0847" }, { "category": "external", "summary": "SUSE Bug 1196584 for CVE-2022-0847", "url": "https://bugzilla.suse.com/1196584" }, { "category": "external", "summary": "SUSE Bug 1196601 for CVE-2022-0847", "url": "https://bugzilla.suse.com/1196601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:06:15Z", "details": "important" } ], "title": "CVE-2022-0847" }, { "cve": "CVE-2022-24448", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-24448" } ], "notes": [ { "category": "general", "text": "An issue was discovered in fs/nfs/dir.c in the Linux kernel before 5.16.5. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should occur, but the server instead returns uninitialized data in the file descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-24448", "url": "https://www.suse.com/security/cve/CVE-2022-24448" }, { "category": "external", "summary": "SUSE Bug 1195612 for CVE-2022-24448", "url": "https://bugzilla.suse.com/1195612" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:06:15Z", "details": "moderate" } ], "title": "CVE-2022-24448" }, { "cve": "CVE-2022-24958", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-24958" } ], "notes": [ { "category": "general", "text": "drivers/usb/gadget/legacy/inode.c in the Linux kernel through 5.16.8 mishandles dev-\u003ebuf release.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-24958", "url": "https://www.suse.com/security/cve/CVE-2022-24958" }, { "category": "external", "summary": "SUSE Bug 1195905 for CVE-2022-24958", "url": "https://bugzilla.suse.com/1195905" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:06:15Z", "details": "moderate" } ], "title": "CVE-2022-24958" }, { "cve": "CVE-2022-24959", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-24959" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.16.5. There is a memory leak in yam_siocdevprivate in drivers/net/hamradio/yam.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-24959", "url": "https://www.suse.com/security/cve/CVE-2022-24959" }, { "category": "external", "summary": "SUSE Bug 1195897 for CVE-2022-24959", "url": "https://bugzilla.suse.com/1195897" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:06:15Z", "details": "moderate" } ], "title": "CVE-2022-24959" }, { "cve": "CVE-2022-25258", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-25258" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/usb/gadget/composite.c in the Linux kernel before 5.16.10. The USB Gadget subsystem lacks certain validation of interface OS descriptor requests (ones with a large array index and ones associated with NULL function pointer retrieval). Memory corruption might occur.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-25258", "url": "https://www.suse.com/security/cve/CVE-2022-25258" }, { "category": "external", "summary": "SUSE Bug 1196095 for CVE-2022-25258", "url": "https://bugzilla.suse.com/1196095" }, { "category": "external", "summary": "SUSE Bug 1196132 for CVE-2022-25258", "url": "https://bugzilla.suse.com/1196132" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:06:15Z", "details": "important" } ], "title": "CVE-2022-25258" }, { "cve": "CVE-2022-25375", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-25375" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/usb/gadget/function/rndis.c in the Linux kernel before 5.16.10. The RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command. Attackers can obtain sensitive information from kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-25375", "url": "https://www.suse.com/security/cve/CVE-2022-25375" }, { "category": "external", "summary": "SUSE Bug 1196235 for CVE-2022-25375", "url": "https://bugzilla.suse.com/1196235" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-24.107.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_107-default-1-5.5.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-24.107.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.ppc64le", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.s390x", "SUSE Manager Server 4.1:kernel-default-base-5.3.18-24.107.1.9.50.2.x86_64", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-devel-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-docs-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-macros-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:kernel-source-5.3.18-24.107.1.noarch", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:kernel-syms-5.3.18-24.107.1.x86_64", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.ppc64le", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.s390x", "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-24.107.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:06:15Z", "details": "moderate" } ], "title": "CVE-2022-25375" } ] }
suse-su-2022:0757-1
Vulnerability from csaf_suse
Published
2022-03-08 18:04
Modified
2022-03-08 18:04
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes.
Transient execution side-channel attacks attacking the Branch History Buffer (BHB),
named 'Branch Target Injection' and 'Intra-Mode Branch History Injection' are now mitigated.
The following security bugs were fixed:
- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).
- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).
- CVE-2022-0847: Fixed a vulnerability were a local attackers could overwrite data in arbitrary (read-only) files (bsc#1196584).
- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)
- CVE-2022-0644: Fixed a denial of service by a local user. A assertion failure could be triggered in kernel_read_file_from_fd() (bsc#1196155).
- CVE-2021-44879: In gc_data_segment() in fs/f2fs/gc.c, special files were not considered, which lead to a move_data_page NULL pointer dereference (bsc#1195987).
- CVE-2022-24959: Fixed a memory leak in yam_siocdevprivate() in drivers/net/hamradio/yam.c (bsc#1195897).
- CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).
- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
- CVE-2022-24448: Fixed an issue in fs/nfs/dir.c. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).
The following non-security bugs were fixed:
- NFSv4.x: by default serialize open/close operations (bsc#1114893 bsc#1195934).
- crypto: af_alg - get_page upon reassignment to TX SGL (bsc#1195840).
- hv_netvsc: fix network namespace issues with VF support (bsc#1107207).
- hv_netvsc: move VF to same namespace as netvsc device (bsc#1107207).
- lib/iov_iter: initialize 'flags' in new pipe_buffer (bsc#1196584).
Patchnames
SUSE-2022-757,SUSE-OpenStack-Cloud-9-2022-757,SUSE-OpenStack-Cloud-Crowbar-9-2022-757,SUSE-SLE-HA-12-SP4-2022-757,SUSE-SLE-Live-Patching-12-SP4-2022-757,SUSE-SLE-SAP-12-SP4-2022-757,SUSE-SLE-SERVER-12-SP4-LTSS-2022-757
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes.\n\n\nTransient execution side-channel attacks attacking the Branch History Buffer (BHB),\nnamed \u0027Branch Target Injection\u0027 and \u0027Intra-Mode Branch History Injection\u0027 are now mitigated.\n\nThe following security bugs were fixed:\n\n- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).\n- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).\n- CVE-2022-0847: Fixed a vulnerability were a local attackers could overwrite data in arbitrary (read-only) files (bsc#1196584).\n- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)\n- CVE-2022-0644: Fixed a denial of service by a local user. A assertion failure could be triggered in kernel_read_file_from_fd() (bsc#1196155).\n- CVE-2021-44879: In gc_data_segment() in fs/f2fs/gc.c, special files were not considered, which lead to a move_data_page NULL pointer dereference (bsc#1195987).\n- CVE-2022-24959: Fixed a memory leak in yam_siocdevprivate() in drivers/net/hamradio/yam.c (bsc#1195897).\n- CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).\n- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).\n- CVE-2022-24448: Fixed an issue in fs/nfs/dir.c. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).\n\nThe following non-security bugs were fixed:\n\n- NFSv4.x: by default serialize open/close operations (bsc#1114893 bsc#1195934).\n- crypto: af_alg - get_page upon reassignment to TX SGL (bsc#1195840).\n- hv_netvsc: fix network namespace issues with VF support (bsc#1107207).\n- hv_netvsc: move VF to same namespace as netvsc device (bsc#1107207).\n- lib/iov_iter: initialize \u0027flags\u0027 in new pipe_buffer (bsc#1196584).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-757,SUSE-OpenStack-Cloud-9-2022-757,SUSE-OpenStack-Cloud-Crowbar-9-2022-757,SUSE-SLE-HA-12-SP4-2022-757,SUSE-SLE-Live-Patching-12-SP4-2022-757,SUSE-SLE-SAP-12-SP4-2022-757,SUSE-SLE-SERVER-12-SP4-LTSS-2022-757", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0757-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:0757-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220757-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:0757-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010402.html" }, { "category": "self", "summary": "SUSE Bug 1107207", "url": "https://bugzilla.suse.com/1107207" }, { "category": "self", "summary": "SUSE Bug 1114893", "url": "https://bugzilla.suse.com/1114893" }, { "category": "self", "summary": "SUSE Bug 1185973", "url": "https://bugzilla.suse.com/1185973" }, { "category": "self", "summary": "SUSE Bug 1191580", "url": "https://bugzilla.suse.com/1191580" }, { "category": "self", "summary": "SUSE Bug 1194516", "url": "https://bugzilla.suse.com/1194516" }, { "category": "self", "summary": "SUSE Bug 1195536", "url": "https://bugzilla.suse.com/1195536" }, { "category": "self", "summary": "SUSE Bug 1195543", "url": "https://bugzilla.suse.com/1195543" }, { "category": "self", "summary": "SUSE Bug 1195612", "url": "https://bugzilla.suse.com/1195612" }, { "category": "self", "summary": "SUSE Bug 1195840", "url": "https://bugzilla.suse.com/1195840" }, { "category": "self", "summary": "SUSE Bug 1195897", "url": "https://bugzilla.suse.com/1195897" }, { "category": "self", "summary": "SUSE Bug 1195908", "url": "https://bugzilla.suse.com/1195908" }, { "category": "self", "summary": "SUSE Bug 1195934", "url": "https://bugzilla.suse.com/1195934" }, { "category": "self", "summary": "SUSE Bug 1195949", "url": "https://bugzilla.suse.com/1195949" }, { "category": "self", "summary": "SUSE Bug 1195987", "url": "https://bugzilla.suse.com/1195987" }, { "category": "self", "summary": "SUSE Bug 1196079", "url": "https://bugzilla.suse.com/1196079" }, { "category": "self", "summary": "SUSE Bug 1196155", "url": "https://bugzilla.suse.com/1196155" }, { "category": "self", "summary": "SUSE Bug 1196584", "url": "https://bugzilla.suse.com/1196584" }, { "category": "self", "summary": "SUSE Bug 1196601", "url": "https://bugzilla.suse.com/1196601" }, { "category": "self", "summary": "SUSE Bug 1196612", "url": "https://bugzilla.suse.com/1196612" }, { "category": "self", "summary": "SUSE CVE CVE-2021-44879 page", "url": "https://www.suse.com/security/cve/CVE-2021-44879/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0001 page", "url": "https://www.suse.com/security/cve/CVE-2022-0001/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0002 page", "url": "https://www.suse.com/security/cve/CVE-2022-0002/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0487 page", "url": "https://www.suse.com/security/cve/CVE-2022-0487/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0492 page", "url": "https://www.suse.com/security/cve/CVE-2022-0492/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0617 page", "url": "https://www.suse.com/security/cve/CVE-2022-0617/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0644 page", "url": "https://www.suse.com/security/cve/CVE-2022-0644/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0847 page", "url": "https://www.suse.com/security/cve/CVE-2022-0847/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-24448 page", "url": "https://www.suse.com/security/cve/CVE-2022-24448/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-24959 page", "url": "https://www.suse.com/security/cve/CVE-2022-24959/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2022-03-08T18:04:15Z", "generator": { "date": "2022-03-08T18:04:15Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:0757-1", "initial_release_date": "2022-03-08T18:04:15Z", "revision_history": [ { "date": "2022-03-08T18:04:15Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-95.93.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.12.14-95.93.1.aarch64", "product_id": "cluster-md-kmp-default-4.12.14-95.93.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-95.93.1.aarch64", "product": { "name": "dlm-kmp-default-4.12.14-95.93.1.aarch64", "product_id": "dlm-kmp-default-4.12.14-95.93.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-95.93.1.aarch64", "product": { "name": "gfs2-kmp-default-4.12.14-95.93.1.aarch64", "product_id": "gfs2-kmp-default-4.12.14-95.93.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-95.93.1.aarch64", "product": { "name": "kernel-default-4.12.14-95.93.1.aarch64", "product_id": "kernel-default-4.12.14-95.93.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-95.93.1.aarch64", "product": { "name": "kernel-default-base-4.12.14-95.93.1.aarch64", "product_id": "kernel-default-base-4.12.14-95.93.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-95.93.1.aarch64", "product": { "name": "kernel-default-devel-4.12.14-95.93.1.aarch64", "product_id": "kernel-default-devel-4.12.14-95.93.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-95.93.1.aarch64", "product": { "name": "kernel-default-extra-4.12.14-95.93.1.aarch64", "product_id": "kernel-default-extra-4.12.14-95.93.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-95.93.1.aarch64", "product": { "name": "kernel-default-kgraft-4.12.14-95.93.1.aarch64", "product_id": "kernel-default-kgraft-4.12.14-95.93.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-95.93.1.aarch64", "product": { "name": "kernel-default-kgraft-devel-4.12.14-95.93.1.aarch64", "product_id": "kernel-default-kgraft-devel-4.12.14-95.93.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-95.93.1.aarch64", "product": { "name": "kernel-obs-build-4.12.14-95.93.1.aarch64", "product_id": "kernel-obs-build-4.12.14-95.93.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-95.93.1.aarch64", "product": { "name": "kernel-obs-qa-4.12.14-95.93.1.aarch64", "product_id": "kernel-obs-qa-4.12.14-95.93.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-95.93.1.aarch64", "product": { "name": "kernel-syms-4.12.14-95.93.1.aarch64", "product_id": "kernel-syms-4.12.14-95.93.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-95.93.1.aarch64", "product": { "name": "kernel-vanilla-4.12.14-95.93.1.aarch64", "product_id": "kernel-vanilla-4.12.14-95.93.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-95.93.1.aarch64", "product": { "name": "kernel-vanilla-base-4.12.14-95.93.1.aarch64", "product_id": "kernel-vanilla-base-4.12.14-95.93.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-95.93.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.12.14-95.93.1.aarch64", "product_id": "kernel-vanilla-devel-4.12.14-95.93.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-95.93.1.aarch64", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-95.93.1.aarch64", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.93.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-95.93.1.aarch64", "product": { "name": "kselftests-kmp-default-4.12.14-95.93.1.aarch64", "product_id": "kselftests-kmp-default-4.12.14-95.93.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-95.93.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.12.14-95.93.1.aarch64", "product_id": "ocfs2-kmp-default-4.12.14-95.93.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-95.93.1.noarch", "product": { "name": "kernel-devel-4.12.14-95.93.1.noarch", "product_id": "kernel-devel-4.12.14-95.93.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-95.93.1.noarch", "product": { "name": "kernel-docs-4.12.14-95.93.1.noarch", "product_id": "kernel-docs-4.12.14-95.93.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-95.93.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-95.93.1.noarch", "product_id": "kernel-docs-html-4.12.14-95.93.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-95.93.1.noarch", "product": { "name": "kernel-macros-4.12.14-95.93.1.noarch", "product_id": "kernel-macros-4.12.14-95.93.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-95.93.1.noarch", "product": { "name": "kernel-source-4.12.14-95.93.1.noarch", "product_id": "kernel-source-4.12.14-95.93.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-95.93.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-95.93.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-95.93.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-95.93.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.12.14-95.93.1.ppc64le", "product_id": "cluster-md-kmp-default-4.12.14-95.93.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-95.93.1.ppc64le", "product": { "name": "dlm-kmp-default-4.12.14-95.93.1.ppc64le", "product_id": "dlm-kmp-default-4.12.14-95.93.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-95.93.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.12.14-95.93.1.ppc64le", "product_id": "gfs2-kmp-default-4.12.14-95.93.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-95.93.1.ppc64le", "product": { "name": "kernel-debug-4.12.14-95.93.1.ppc64le", "product_id": "kernel-debug-4.12.14-95.93.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-95.93.1.ppc64le", "product": { "name": "kernel-debug-base-4.12.14-95.93.1.ppc64le", "product_id": "kernel-debug-base-4.12.14-95.93.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-95.93.1.ppc64le", "product": { "name": "kernel-debug-devel-4.12.14-95.93.1.ppc64le", "product_id": "kernel-debug-devel-4.12.14-95.93.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-kgraft-devel-4.12.14-95.93.1.ppc64le", "product": { "name": "kernel-debug-kgraft-devel-4.12.14-95.93.1.ppc64le", "product_id": "kernel-debug-kgraft-devel-4.12.14-95.93.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.12.14-95.93.1.ppc64le", "product": { "name": "kernel-default-4.12.14-95.93.1.ppc64le", "product_id": "kernel-default-4.12.14-95.93.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-95.93.1.ppc64le", "product": { "name": "kernel-default-base-4.12.14-95.93.1.ppc64le", "product_id": "kernel-default-base-4.12.14-95.93.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-95.93.1.ppc64le", "product": { "name": "kernel-default-devel-4.12.14-95.93.1.ppc64le", "product_id": "kernel-default-devel-4.12.14-95.93.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-95.93.1.ppc64le", "product": { "name": "kernel-default-extra-4.12.14-95.93.1.ppc64le", "product_id": "kernel-default-extra-4.12.14-95.93.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-95.93.1.ppc64le", "product": { "name": "kernel-default-kgraft-4.12.14-95.93.1.ppc64le", "product_id": "kernel-default-kgraft-4.12.14-95.93.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le", "product": { "name": "kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le", "product_id": "kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-95.93.1.ppc64le", "product": { "name": "kernel-obs-build-4.12.14-95.93.1.ppc64le", "product_id": "kernel-obs-build-4.12.14-95.93.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-95.93.1.ppc64le", "product": { "name": "kernel-obs-qa-4.12.14-95.93.1.ppc64le", "product_id": "kernel-obs-qa-4.12.14-95.93.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-95.93.1.ppc64le", "product": { "name": "kernel-syms-4.12.14-95.93.1.ppc64le", "product_id": "kernel-syms-4.12.14-95.93.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-95.93.1.ppc64le", "product": { "name": "kernel-vanilla-4.12.14-95.93.1.ppc64le", "product_id": "kernel-vanilla-4.12.14-95.93.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-95.93.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.12.14-95.93.1.ppc64le", "product_id": "kernel-vanilla-base-4.12.14-95.93.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-95.93.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.12.14-95.93.1.ppc64le", "product_id": "kernel-vanilla-devel-4.12.14-95.93.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-95.93.1.ppc64le", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-95.93.1.ppc64le", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.93.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le", "product": { "name": "kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le", "product_id": "kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-95.93.1.ppc64le", "product": { "name": "kselftests-kmp-default-4.12.14-95.93.1.ppc64le", "product_id": "kselftests-kmp-default-4.12.14-95.93.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-95.93.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.12.14-95.93.1.ppc64le", "product_id": "ocfs2-kmp-default-4.12.14-95.93.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-95.93.1.s390x", "product": { "name": "cluster-md-kmp-default-4.12.14-95.93.1.s390x", "product_id": "cluster-md-kmp-default-4.12.14-95.93.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-95.93.1.s390x", "product": { "name": "dlm-kmp-default-4.12.14-95.93.1.s390x", "product_id": "dlm-kmp-default-4.12.14-95.93.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-95.93.1.s390x", "product": { "name": "gfs2-kmp-default-4.12.14-95.93.1.s390x", "product_id": "gfs2-kmp-default-4.12.14-95.93.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.12.14-95.93.1.s390x", "product": { "name": "kernel-default-4.12.14-95.93.1.s390x", "product_id": "kernel-default-4.12.14-95.93.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-95.93.1.s390x", "product": { "name": "kernel-default-base-4.12.14-95.93.1.s390x", "product_id": "kernel-default-base-4.12.14-95.93.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-95.93.1.s390x", "product": { "name": "kernel-default-devel-4.12.14-95.93.1.s390x", "product_id": "kernel-default-devel-4.12.14-95.93.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-95.93.1.s390x", "product": { "name": "kernel-default-extra-4.12.14-95.93.1.s390x", "product_id": "kernel-default-extra-4.12.14-95.93.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-95.93.1.s390x", "product": { "name": "kernel-default-kgraft-4.12.14-95.93.1.s390x", "product_id": "kernel-default-kgraft-4.12.14-95.93.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-95.93.1.s390x", "product": { "name": "kernel-default-kgraft-devel-4.12.14-95.93.1.s390x", "product_id": "kernel-default-kgraft-devel-4.12.14-95.93.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.12.14-95.93.1.s390x", "product": { "name": "kernel-default-man-4.12.14-95.93.1.s390x", "product_id": "kernel-default-man-4.12.14-95.93.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-95.93.1.s390x", "product": { "name": "kernel-obs-build-4.12.14-95.93.1.s390x", "product_id": "kernel-obs-build-4.12.14-95.93.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-95.93.1.s390x", "product": { "name": "kernel-obs-qa-4.12.14-95.93.1.s390x", "product_id": "kernel-obs-qa-4.12.14-95.93.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-95.93.1.s390x", "product": { "name": "kernel-syms-4.12.14-95.93.1.s390x", "product_id": "kernel-syms-4.12.14-95.93.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-95.93.1.s390x", "product": { "name": "kernel-vanilla-4.12.14-95.93.1.s390x", "product_id": "kernel-vanilla-4.12.14-95.93.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-95.93.1.s390x", "product": { "name": "kernel-vanilla-base-4.12.14-95.93.1.s390x", "product_id": "kernel-vanilla-base-4.12.14-95.93.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-95.93.1.s390x", "product": { "name": "kernel-vanilla-devel-4.12.14-95.93.1.s390x", "product_id": "kernel-vanilla-devel-4.12.14-95.93.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-95.93.1.s390x", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-95.93.1.s390x", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.93.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.12.14-95.93.1.s390x", "product": { "name": "kernel-zfcpdump-4.12.14-95.93.1.s390x", "product_id": "kernel-zfcpdump-4.12.14-95.93.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-man-4.12.14-95.93.1.s390x", "product": { "name": "kernel-zfcpdump-man-4.12.14-95.93.1.s390x", "product_id": "kernel-zfcpdump-man-4.12.14-95.93.1.s390x" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x", "product": { "name": "kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x", "product_id": "kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-95.93.1.s390x", "product": { "name": "kselftests-kmp-default-4.12.14-95.93.1.s390x", "product_id": "kselftests-kmp-default-4.12.14-95.93.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-95.93.1.s390x", "product": { "name": "ocfs2-kmp-default-4.12.14-95.93.1.s390x", "product_id": "ocfs2-kmp-default-4.12.14-95.93.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-95.93.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.12.14-95.93.1.x86_64", "product_id": "cluster-md-kmp-default-4.12.14-95.93.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-95.93.1.x86_64", "product": { "name": "dlm-kmp-default-4.12.14-95.93.1.x86_64", "product_id": "dlm-kmp-default-4.12.14-95.93.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-95.93.1.x86_64", "product": { "name": "gfs2-kmp-default-4.12.14-95.93.1.x86_64", "product_id": "gfs2-kmp-default-4.12.14-95.93.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-95.93.1.x86_64", "product": { "name": "kernel-debug-4.12.14-95.93.1.x86_64", "product_id": "kernel-debug-4.12.14-95.93.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-95.93.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-95.93.1.x86_64", "product_id": "kernel-debug-base-4.12.14-95.93.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-95.93.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-95.93.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-95.93.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-kgraft-devel-4.12.14-95.93.1.x86_64", "product": { "name": "kernel-debug-kgraft-devel-4.12.14-95.93.1.x86_64", "product_id": "kernel-debug-kgraft-devel-4.12.14-95.93.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-95.93.1.x86_64", "product": { "name": "kernel-default-4.12.14-95.93.1.x86_64", "product_id": "kernel-default-4.12.14-95.93.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-95.93.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-95.93.1.x86_64", "product_id": "kernel-default-base-4.12.14-95.93.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-95.93.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-95.93.1.x86_64", "product_id": "kernel-default-devel-4.12.14-95.93.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-95.93.1.x86_64", "product": { "name": "kernel-default-extra-4.12.14-95.93.1.x86_64", "product_id": "kernel-default-extra-4.12.14-95.93.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-95.93.1.x86_64", "product": { "name": "kernel-default-kgraft-4.12.14-95.93.1.x86_64", "product_id": "kernel-default-kgraft-4.12.14-95.93.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64", "product": { "name": "kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64", "product_id": "kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-95.93.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-95.93.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-95.93.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-95.93.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-95.93.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-95.93.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-95.93.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-95.93.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-95.93.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-kgraft-devel-4.12.14-95.93.1.x86_64", "product": { "name": "kernel-kvmsmall-kgraft-devel-4.12.14-95.93.1.x86_64", "product_id": "kernel-kvmsmall-kgraft-devel-4.12.14-95.93.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-95.93.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-95.93.1.x86_64", "product_id": "kernel-obs-build-4.12.14-95.93.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-95.93.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-95.93.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-95.93.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-95.93.1.x86_64", "product": { "name": "kernel-syms-4.12.14-95.93.1.x86_64", "product_id": "kernel-syms-4.12.14-95.93.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-95.93.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-95.93.1.x86_64", "product_id": "kernel-vanilla-4.12.14-95.93.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-95.93.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-95.93.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-95.93.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-95.93.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-95.93.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-95.93.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-95.93.1.x86_64", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-95.93.1.x86_64", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.93.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64", "product": { "name": "kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64", "product_id": "kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-95.93.1.x86_64", "product": { "name": "kselftests-kmp-default-4.12.14-95.93.1.x86_64", "product_id": "kselftests-kmp-default-4.12.14-95.93.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-95.93.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.12.14-95.93.1.x86_64", "product_id": "ocfs2-kmp-default-4.12.14-95.93.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE OpenStack Cloud 9", "product": { "name": "SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:9" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud Crowbar 9", "product": { "name": "SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:9" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 12 SP4", "product": { "name": "SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.93.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.93.1.x86_64" }, "product_reference": "kernel-default-4.12.14-95.93.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.93.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.93.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-95.93.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.93.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.93.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-95.93.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-95.93.1.noarch as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.93.1.noarch" }, "product_reference": "kernel-devel-4.12.14-95.93.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-95.93.1.noarch as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.93.1.noarch" }, "product_reference": "kernel-macros-4.12.14-95.93.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-95.93.1.noarch as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.93.1.noarch" }, "product_reference": "kernel-source-4.12.14-95.93.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.93.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.93.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-95.93.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.93.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.93.1.x86_64" }, "product_reference": "kernel-default-4.12.14-95.93.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.93.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.93.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-95.93.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.93.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.93.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-95.93.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-95.93.1.noarch as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.93.1.noarch" }, "product_reference": "kernel-devel-4.12.14-95.93.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-95.93.1.noarch as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.93.1.noarch" }, "product_reference": "kernel-macros-4.12.14-95.93.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-95.93.1.noarch as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.93.1.noarch" }, "product_reference": "kernel-source-4.12.14-95.93.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.93.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.93.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-95.93.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-95.93.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.12.14-95.93.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-95.93.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.12.14-95.93.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-95.93.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.12.14-95.93.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-95.93.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.12.14-95.93.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-95.93.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.s390x" }, "product_reference": "dlm-kmp-default-4.12.14-95.93.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-95.93.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.x86_64" }, "product_reference": "dlm-kmp-default-4.12.14-95.93.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-95.93.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.12.14-95.93.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-95.93.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.s390x" }, "product_reference": "gfs2-kmp-default-4.12.14-95.93.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-95.93.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.12.14-95.93.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-95.93.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.12.14-95.93.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-95.93.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.12.14-95.93.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-95.93.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.12.14-95.93.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-95.93.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.ppc64le" }, "product_reference": "kernel-default-kgraft-4.12.14-95.93.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-95.93.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.s390x" }, "product_reference": "kernel-default-kgraft-4.12.14-95.93.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-95.93.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.x86_64" }, "product_reference": "kernel-default-kgraft-4.12.14-95.93.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-95.93.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.s390x" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-95.93.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.93.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-95.93.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.93.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.x86_64" }, "product_reference": "kernel-default-4.12.14-95.93.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.93.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-95.93.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.93.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-95.93.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.93.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-95.93.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.93.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-95.93.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-95.93.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.93.1.noarch" }, "product_reference": "kernel-devel-4.12.14-95.93.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-95.93.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.93.1.noarch" }, "product_reference": "kernel-macros-4.12.14-95.93.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-95.93.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.93.1.noarch" }, "product_reference": "kernel-source-4.12.14-95.93.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.93.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-95.93.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.93.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-95.93.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.93.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.aarch64" }, "product_reference": "kernel-default-4.12.14-95.93.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.93.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-95.93.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.93.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.s390x" }, "product_reference": "kernel-default-4.12.14-95.93.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.93.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.x86_64" }, "product_reference": "kernel-default-4.12.14-95.93.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.93.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-95.93.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.93.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-95.93.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.93.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-95.93.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.93.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-95.93.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.93.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-95.93.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.93.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-95.93.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.93.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-95.93.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.93.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-95.93.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-95.93.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.93.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-95.93.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-95.93.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.93.1.noarch" }, "product_reference": "kernel-devel-4.12.14-95.93.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-95.93.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.93.1.noarch" }, "product_reference": "kernel-macros-4.12.14-95.93.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-95.93.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.93.1.noarch" }, "product_reference": "kernel-source-4.12.14-95.93.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.93.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-95.93.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.93.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-95.93.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.93.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.s390x" }, "product_reference": "kernel-syms-4.12.14-95.93.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.93.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-95.93.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-44879", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-44879" } ], "notes": [ { "category": "general", "text": "In gc_data_segment in fs/f2fs/gc.c in the Linux kernel before 5.16.3, special files are not considered, leading to a move_data_page NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.93.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-44879", "url": "https://www.suse.com/security/cve/CVE-2021-44879" }, { "category": "external", "summary": "SUSE Bug 1195987 for CVE-2021-44879", "url": "https://bugzilla.suse.com/1195987" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.93.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.93.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:04:15Z", "details": "moderate" } ], "title": "CVE-2021-44879" }, { "cve": "CVE-2022-0001", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0001" } ], "notes": [ { "category": "general", "text": "Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.93.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0001", "url": "https://www.suse.com/security/cve/CVE-2022-0001" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2022-0001", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2022-0001", "url": "https://bugzilla.suse.com/1196901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.93.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.93.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:04:15Z", "details": "moderate" } ], "title": "CVE-2022-0001" }, { "cve": "CVE-2022-0002", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0002" } ], "notes": [ { "category": "general", "text": "Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.93.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0002", "url": "https://www.suse.com/security/cve/CVE-2022-0002" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2022-0002", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2022-0002", "url": "https://bugzilla.suse.com/1196901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.93.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.93.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:04:15Z", "details": "moderate" } ], "title": "CVE-2022-0002" }, { "cve": "CVE-2022-0487", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0487" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove in drivers/memstick/host/rtsx_usb_ms.c in memstick in the Linux kernel. In this flaw, a local attacker with a user privilege may impact system Confidentiality. This flaw affects kernel versions prior to 5.14 rc1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.93.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0487", "url": "https://www.suse.com/security/cve/CVE-2022-0487" }, { "category": "external", "summary": "SUSE Bug 1194516 for CVE-2022-0487", "url": "https://bugzilla.suse.com/1194516" }, { "category": "external", "summary": "SUSE Bug 1195949 for CVE-2022-0487", "url": "https://bugzilla.suse.com/1195949" }, { "category": "external", "summary": "SUSE Bug 1198615 for CVE-2022-0487", "url": "https://bugzilla.suse.com/1198615" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.93.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.93.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:04:15Z", "details": "moderate" } ], "title": "CVE-2022-0487" }, { "cve": "CVE-2022-0492", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0492" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in the Linux kernel\u0027s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.93.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0492", "url": "https://www.suse.com/security/cve/CVE-2022-0492" }, { "category": "external", "summary": "SUSE Bug 1195543 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1195543" }, { "category": "external", "summary": "SUSE Bug 1195908 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1195908" }, { "category": "external", "summary": "SUSE Bug 1196612 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1196612" }, { "category": "external", "summary": "SUSE Bug 1196776 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1196776" }, { "category": "external", "summary": "SUSE Bug 1198615 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1198615" }, { "category": "external", "summary": "SUSE Bug 1199255 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1199255" }, { "category": "external", "summary": "SUSE Bug 1199615 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1199615" }, { "category": "external", "summary": "SUSE Bug 1200084 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1200084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.93.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.93.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:04:15Z", "details": "moderate" } ], "title": "CVE-2022-0492" }, { "cve": "CVE-2022-0617", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0617" } ], "notes": [ { "category": "general", "text": "A flaw null pointer dereference in the Linux kernel UDF file system functionality was found in the way user triggers udf_file_write_iter function for the malicious UDF image. A local user could use this flaw to crash the system. Actual from Linux kernel 4.2-rc1 till 5.17-rc2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.93.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0617", "url": "https://www.suse.com/security/cve/CVE-2022-0617" }, { "category": "external", "summary": "SUSE Bug 1196079 for CVE-2022-0617", "url": "https://bugzilla.suse.com/1196079" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.93.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.93.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:04:15Z", "details": "moderate" } ], "title": "CVE-2022-0617" }, { "cve": "CVE-2022-0644", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0644" } ], "notes": [ { "category": "general", "text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.93.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0644", "url": "https://www.suse.com/security/cve/CVE-2022-0644" }, { "category": "external", "summary": "SUSE Bug 1196155 for CVE-2022-0644", "url": "https://bugzilla.suse.com/1196155" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.93.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.93.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:04:15Z", "details": "moderate" } ], "title": "CVE-2022-0644" }, { "cve": "CVE-2022-0847", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0847" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way the \"flags\" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.93.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0847", "url": "https://www.suse.com/security/cve/CVE-2022-0847" }, { "category": "external", "summary": "SUSE Bug 1196584 for CVE-2022-0847", "url": "https://bugzilla.suse.com/1196584" }, { "category": "external", "summary": "SUSE Bug 1196601 for CVE-2022-0847", "url": "https://bugzilla.suse.com/1196601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.93.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.93.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:04:15Z", "details": "important" } ], "title": "CVE-2022-0847" }, { "cve": "CVE-2022-24448", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-24448" } ], "notes": [ { "category": "general", "text": "An issue was discovered in fs/nfs/dir.c in the Linux kernel before 5.16.5. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should occur, but the server instead returns uninitialized data in the file descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.93.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-24448", "url": "https://www.suse.com/security/cve/CVE-2022-24448" }, { "category": "external", "summary": "SUSE Bug 1195612 for CVE-2022-24448", "url": "https://bugzilla.suse.com/1195612" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.93.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.93.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:04:15Z", "details": "moderate" } ], "title": "CVE-2022-24448" }, { "cve": "CVE-2022-24959", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-24959" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.16.5. There is a memory leak in yam_siocdevprivate in drivers/net/hamradio/yam.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.93.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-24959", "url": "https://www.suse.com/security/cve/CVE-2022-24959" }, { "category": "external", "summary": "SUSE Bug 1195897 for CVE-2022-24959", "url": "https://bugzilla.suse.com/1195897" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.93.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_93-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.93.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.93.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.93.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.93.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:04:15Z", "details": "moderate" } ], "title": "CVE-2022-24959" } ] }
suse-su-2022:0767-1
Vulnerability from csaf_suse
Published
2022-03-09 10:21
Modified
2022-03-09 10:21
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes.
Transient execution side-channel attacks attacking the Branch History Buffer (BHB),
named 'Branch Target Injection' and 'Intra-Mode Branch History Injection' are now mitigated.
The following security bugs were fixed:
- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).
- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).
- CVE-2022-0847: Fixed a vulnerability were a local attackers could overwrite data in arbitrary (read-only) files (bsc#1196584).
- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)
- CVE-2022-0644: Fixed a denial of service by a local user. A assertion failure could be triggered in kernel_read_file_from_fd() (bsc#1196155).
- CVE-2021-44879: In gc_data_segment() in fs/f2fs/gc.c, special files were not considered, which lead to a move_data_page NULL pointer dereference (bsc#1195987).
- CVE-2022-24959: Fixed a memory leak in yam_siocdevprivate() in drivers/net/hamradio/yam.c (bsc#1195897).
- CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).
- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
- CVE-2022-24448: Fixed an issue in fs/nfs/dir.c. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).
- CVE-2021-45095: Fixed refcount leak in pep_sock_accept in net/phonet/pep.c (bsc#1193867).
The following non-security bugs were fixed:
- Bluetooth: bfusb: fix division by zero in send path (git-fixes).
- Bluetooth: fix the erroneous flush_work() order (git-fixes).
- EDAC/xgene: Fix deferred probing (bsc#1114648).
- IB/rdmavt: Validate remote_addr during loopback atomic tests (bsc#1114685).
- NFSv4.x: by default serialize open/close operations (bsc#1114893 bsc#1195934). Make this work-around optional
- NFSv42: Do not fail clone() unless the OP_CLONE operation failed (git-fixes).
- NFSv42: Fix pagecache invalidation after COPY/CLONE (git-fixes).
- NFSv4: Handle case where the lookup of a directory fails (git-fixes).
- NFSv4: nfs_atomic_open() can race when looking up a non-regular file (git-fixes).
- PCI: Add function 1 DMA alias quirk for Marvell 88SE9125 SATA controller (git-fixes).
- RDMA/bnxt_re: Fix query SRQ failure (bsc#1050244).
- RDMA/mlx5: Set user priority for DCT (bsc#1103991).
- RDMA/netlink: Add __maybe_unused to static inline in C file (bsc#1046306).
- Replace with an alternative fix for bsc#1185377
- crypto: af_alg - get_page upon reassignment to TX SGL (bsc#1195840).
- cxgb4: fix eeprom len when diagnostics not implemented (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- e1000e: Fix packet loss on Tiger Lake and later (bsc#1158533).
- ext4: avoid trim error on fs with small groups (bsc#1191271).
- fuse: annotate lock in fuse_reverse_inval_entry() (bsc#1195795).
- gve: Add RX context (bsc#1191655).
- gve: Add a jumbo-frame device option (bsc#1191655).
- gve: Add consumed counts to ethtool stats (bsc#1191655).
- gve: Add netif_set_xps_queue call (bsc#1191655).
- gve: Add optional metadata descriptor type GVE_TXD_MTD (bsc#1191655).
- gve: Add rx buffer pagecnt bias (bsc#1191655).
- gve: Allow pageflips on larger pages (bsc#1191655).
- gve: Avoid freeing NULL pointer (bsc#1191655).
- gve: Correct available tx qpl check (bsc#1191655).
- gve: Correct order of processing device options (bsc#1191655).
- gve: DQO: avoid unused variable warnings (bsc#1191655).
- gve: Do lazy cleanup in TX path (bsc#1191655).
- gve: Fix GFP flags when allocing pages (bsc#1191655).
- gve: Implement packet continuation for RX (bsc#1191655).
- gve: Implement suspend/resume/shutdown (bsc#1191655).
- gve: Move the irq db indexes out of the ntfy block struct (bsc#1191655).
- gve: Properly handle errors in gve_assign_qpl (bsc#1191655).
- gve: Recording rx queue before sending to napi (bsc#1191655).
- gve: Switch to use napi_complete_done (bsc#1191655).
- gve: Track RX buffer allocation failures (bsc#1191655).
- gve: Update gve_free_queue_page_list signature (bsc#1191655).
- gve: Use kvcalloc() instead of kvzalloc() (bsc#1191655).
- gve: fix for null pointer dereference (bsc#1191655).
- gve: fix gve_get_stats() (bsc#1191655).
- gve: fix the wrong AdminQ buffer queue index check (bsc#1191655).
- gve: fix unmatched u64_stats_update_end() (bsc#1191655).
- gve: remove memory barrier around seqno (bsc#1191655).
- gve: report 64bit tx_bytes counter from gve_handle_report_stats() (bsc#1191655).
- i40e: Fix changing previously set num_queue_pairs for PFs (bsc#1094978).
- i40e: Fix correct max_pkt_size on VF RX queue (bsc#1101816 ).
- i40e: Fix creation of first queue by omitting it if is not power of two (bsc#1101816).
- i40e: Fix display error code in dmesg (bsc#1109837 bsc#1111981 ).
- i40e: Fix for displaying message regarding NVM version (jsc#SLE-4797).
- i40e: Fix freeing of uninitialized misc IRQ vector (bsc#1101816 ).
- i40e: Fix ping is lost after configuring ADq on VF (bsc#1094978).
- i40e: Fix pre-set max number of queues for VF (bsc#1111981 ).
- i40e: Increase delay to 1 s after global EMP reset (bsc#1101816 ).
- iavf: Fix limit of total number of queues to active queues of VF (bsc#1111981).
- iavf: prevent accidental free of filter structure (bsc#1111981 ).
- ibmvnic: Allow queueing resets during probe (bsc#1196516 ltc#196391).
- ibmvnic: Update driver return codes (bsc#1196516 ltc#196391).
- ibmvnic: clear fop when retrying probe (bsc#1196516 ltc#196391).
- ibmvnic: complete init_done on transport events (bsc#1196516 ltc#196391).
- ibmvnic: define flush_reset_queue helper (bsc#1196516 ltc#196391).
- ibmvnic: free reset-work-item when flushing (bsc#1196516 ltc#196391).
- ibmvnic: init init_done_rc earlier (bsc#1196516 ltc#196391).
- ibmvnic: initialize rc before completing wait (bsc#1196516 ltc#196391).
- ibmvnic: register netdev after init of adapter (bsc#1196516 ltc#196391).
- ibmvnic: schedule failover only if vioctl fails (bsc#1196400 ltc#195815).
- ice: Delete always true check of PF pointer (bsc#1118661 ).
- ice: ignore dropped packets during init (bsc#1118661 ).
- igb: Fix removal of unicast MAC filters of VFs (bsc#1117495).
- ixgbevf: Require large buffers for build_skb on 82599VF (bsc#1101674).
- kabi: Hide changes to s390/AP structures (jsc#SLE-20809).
- lib/iov_iter: initialize 'flags' in new pipe_buffer (bsc#1196584).
- mqprio: Correct stats in mqprio_dump_class_stats() (bsc#1109837).
- net/ibmvnic: Cleanup workaround doing an EOI after partition migration (bsc#1089644 ltc#166495 ltc#165544 git-fixes).
- net: Prevent infinite while loop in skb_tx_hash() (bsc#1109837).
- net: ena: Fix error handling when calculating max IO queues number (bsc#1174852).
- net: ena: Fix undefined state when tx request id is out of bounds (bsc#1174852).
- net: marvell: mvpp2: Fix the computation of shared CPUs (bsc#1119113).
- net: phylink: avoid mvneta warning when setting pause parameters (bsc#1119113).
- net: usb: pegasus: Do not drop long Ethernet frames (git-fixes).
- nfsd: fix use-after-free due to delegation race (git-fixes).
- phylib: fix potential use-after-free (bsc#1119113).
- platform/mellanox: mlxreg-io: Fix argument base in kstrtou32() call (bsc#1112374).
- powerpc/64s: Fix debugfs_simple_attr.cocci warnings (bsc#1157038 bsc#1157923 ltc#182612 git-fixes).
- powerpc/pseries/ddw: Revert 'Extend upper limit for huge DMA window for persistent memory' (bsc#1195995 ltc#196394).
- powerpc/pseries: read the lpar name from the firmware (bsc#1187716 ltc#193451).
- powerpc: add link stack flush mitigation status in debugfs (bsc#1157038 bsc#1157923 ltc#182612 git-fixes).
- qed: Handle management FW error (git-fixes).
- qed: rdma - do not wait for resources under hw error recovery flow (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- rndis_host: support Hytera digital radios (git-fixes).
- s390/AP: support new dynamic AP bus size limit (jsc#SLE-20809).
- s390/ap: rework crypto config info and default domain code (jsc#SLE-20809).
- s390/cpumf: Support for CPU Measurement Facility CSVN 7 (bsc#1195080 LTC#196090).
- s390/cpumf: Support for CPU Measurement Sampling Facility LS bit (bsc#1195080 LTC#196090).
- s390/hypfs: include z/VM guests with access control group set (bsc#1195638 LTC#196354).
- scsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put() (git-fixes).
- scsi: lpfc: Fix pt2pt NVMe PRLI reject LOGO loop (bsc#1189126).
- scsi: lpfc: Terminate string in lpfc_debugfs_nvmeio_trc_write() (git-fixes).
- scsi: nsp_cs: Check of ioremap return value (git-fixes).
- scsi: qedf: Fix potential dereference of NULL pointer (git-fixes).
- scsi: qla2xxx: Add devids and conditionals for 28xx (bsc#1195823).
- scsi: qla2xxx: Add ql2xnvme_queues module param to configure number of NVMe queues (bsc#1195823).
- scsi: qla2xxx: Add qla2x00_async_done() for async routines (bsc#1195823).
- scsi: qla2xxx: Add retry for exec firmware (bsc#1195823).
- scsi: qla2xxx: Check for firmware dump already collected (bsc#1195823).
- scsi: qla2xxx: Fix T10 PI tag escape and IP guard options for 28XX adapters (bsc#1195823).
- scsi: qla2xxx: Fix device reconnect in loop topology (bsc#1195823).
- scsi: qla2xxx: Fix premature hw access after PCI error (bsc#1195823).
- scsi: qla2xxx: Fix scheduling while atomic (bsc#1195823).
- scsi: qla2xxx: Fix stuck session in gpdb (bsc#1195823).
- scsi: qla2xxx: Fix unmap of already freed sgl (bsc#1195823).
- scsi: qla2xxx: Fix warning for missing error code (bsc#1195823).
- scsi: qla2xxx: Fix warning message due to adisc being flushed (bsc#1195823).
- scsi: qla2xxx: Fix wrong FDMI data for 64G adapter (bsc#1195823).
- scsi: qla2xxx: Implement ref count for SRB (bsc#1195823).
- scsi: qla2xxx: Refactor asynchronous command initialization (bsc#1195823).
- scsi: qla2xxx: Remove a declaration (bsc#1195823).
- scsi: qla2xxx: Remove unused qla_sess_op_cmd_list from scsi_qla_host_t (bsc#1195823).
- scsi: qla2xxx: Return -ENOMEM if kzalloc() fails (bsc#1195823).
- scsi: qla2xxx: Suppress a kernel complaint in qla_create_qpair() (bsc#1195823).
- scsi: qla2xxx: Update version to 10.02.07.300-k (bsc#1195823).
- scsi: qla2xxx: edif: Fix clang warning (bsc#1195823).
- scsi: qla2xxx: edif: Fix inconsistent check of db_flags (bsc#1195823).
- scsi: qla2xxx: edif: Reduce connection thrash (bsc#1195823).
- scsi: qla2xxx: edif: Replace list_for_each_safe with list_for_each_entry_safe (bsc#1195823).
- scsi: qla2xxx: edif: Tweak trace message (bsc#1195823).
- scsi: scsi_debug: Sanity check block descriptor length in resp_mode_select() (git-fixes).
- scsi: ufs: Fix race conditions related to driver data (git-fixes).
- scsi: zfcp: Fix failed recovery on gone remote port with non-NPIV FCP devices (bsc#1195377 LTC#196245).
- sunrpc/auth_gss: support timeout on gss upcalls (bsc#1193857).
- tracing: Dump stacktrace trigger to the corresponding instance (git-fixes).
- tracing: Have traceon and traceoff trigger honor the instance (git-fixes).
- usb: common: ulpi: Fix crash in ulpi_match() (git-fixes).
- usb: typec: tcpm: Do not disconnect while receiving VBUS off (git-fixes).
- xfrm: fix MTU regression (bsc#1185377, bsc#1194048).
Patchnames
SUSE-2022-767,SUSE-SLE-HA-12-SP5-2022-767,SUSE-SLE-Live-Patching-12-SP5-2022-767,SUSE-SLE-SDK-12-SP5-2022-767,SUSE-SLE-SERVER-12-SP5-2022-767,SUSE-SLE-WE-12-SP5-2022-767
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes.\n\nTransient execution side-channel attacks attacking the Branch History Buffer (BHB),\nnamed \u0027Branch Target Injection\u0027 and \u0027Intra-Mode Branch History Injection\u0027 are now mitigated.\n\nThe following security bugs were fixed:\n\n- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).\n- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).\n- CVE-2022-0847: Fixed a vulnerability were a local attackers could overwrite data in arbitrary (read-only) files (bsc#1196584).\n- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)\n- CVE-2022-0644: Fixed a denial of service by a local user. A assertion failure could be triggered in kernel_read_file_from_fd() (bsc#1196155).\n- CVE-2021-44879: In gc_data_segment() in fs/f2fs/gc.c, special files were not considered, which lead to a move_data_page NULL pointer dereference (bsc#1195987).\n- CVE-2022-24959: Fixed a memory leak in yam_siocdevprivate() in drivers/net/hamradio/yam.c (bsc#1195897).\n- CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).\n- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).\n- CVE-2022-24448: Fixed an issue in fs/nfs/dir.c. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).\n- CVE-2021-45095: Fixed refcount leak in pep_sock_accept in net/phonet/pep.c (bsc#1193867).\n\nThe following non-security bugs were fixed:\n\n- Bluetooth: bfusb: fix division by zero in send path (git-fixes).\n- Bluetooth: fix the erroneous flush_work() order (git-fixes).\n- EDAC/xgene: Fix deferred probing (bsc#1114648).\n- IB/rdmavt: Validate remote_addr during loopback atomic tests (bsc#1114685).\n- NFSv4.x: by default serialize open/close operations (bsc#1114893 bsc#1195934). Make this work-around optional\n- NFSv42: Do not fail clone() unless the OP_CLONE operation failed (git-fixes).\n- NFSv42: Fix pagecache invalidation after COPY/CLONE (git-fixes).\n- NFSv4: Handle case where the lookup of a directory fails (git-fixes).\n- NFSv4: nfs_atomic_open() can race when looking up a non-regular file (git-fixes).\n- PCI: Add function 1 DMA alias quirk for Marvell 88SE9125 SATA controller (git-fixes).\n- RDMA/bnxt_re: Fix query SRQ failure (bsc#1050244).\n- RDMA/mlx5: Set user priority for DCT (bsc#1103991).\n- RDMA/netlink: Add __maybe_unused to static inline in C file (bsc#1046306).\n- Replace with an alternative fix for bsc#1185377\n- crypto: af_alg - get_page upon reassignment to TX SGL (bsc#1195840).\n- cxgb4: fix eeprom len when diagnostics not implemented (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- e1000e: Fix packet loss on Tiger Lake and later (bsc#1158533).\n- ext4: avoid trim error on fs with small groups (bsc#1191271).\n- fuse: annotate lock in fuse_reverse_inval_entry() (bsc#1195795).\n- gve: Add RX context (bsc#1191655).\n- gve: Add a jumbo-frame device option (bsc#1191655).\n- gve: Add consumed counts to ethtool stats (bsc#1191655).\n- gve: Add netif_set_xps_queue call (bsc#1191655).\n- gve: Add optional metadata descriptor type GVE_TXD_MTD (bsc#1191655).\n- gve: Add rx buffer pagecnt bias (bsc#1191655).\n- gve: Allow pageflips on larger pages (bsc#1191655).\n- gve: Avoid freeing NULL pointer (bsc#1191655).\n- gve: Correct available tx qpl check (bsc#1191655).\n- gve: Correct order of processing device options (bsc#1191655).\n- gve: DQO: avoid unused variable warnings (bsc#1191655).\n- gve: Do lazy cleanup in TX path (bsc#1191655).\n- gve: Fix GFP flags when allocing pages (bsc#1191655).\n- gve: Implement packet continuation for RX (bsc#1191655).\n- gve: Implement suspend/resume/shutdown (bsc#1191655).\n- gve: Move the irq db indexes out of the ntfy block struct (bsc#1191655).\n- gve: Properly handle errors in gve_assign_qpl (bsc#1191655).\n- gve: Recording rx queue before sending to napi (bsc#1191655).\n- gve: Switch to use napi_complete_done (bsc#1191655).\n- gve: Track RX buffer allocation failures (bsc#1191655).\n- gve: Update gve_free_queue_page_list signature (bsc#1191655).\n- gve: Use kvcalloc() instead of kvzalloc() (bsc#1191655).\n- gve: fix for null pointer dereference (bsc#1191655).\n- gve: fix gve_get_stats() (bsc#1191655).\n- gve: fix the wrong AdminQ buffer queue index check (bsc#1191655).\n- gve: fix unmatched u64_stats_update_end() (bsc#1191655).\n- gve: remove memory barrier around seqno (bsc#1191655).\n- gve: report 64bit tx_bytes counter from gve_handle_report_stats() (bsc#1191655).\n- i40e: Fix changing previously set num_queue_pairs for PFs (bsc#1094978).\n- i40e: Fix correct max_pkt_size on VF RX queue (bsc#1101816 ).\n- i40e: Fix creation of first queue by omitting it if is not power of two (bsc#1101816).\n- i40e: Fix display error code in dmesg (bsc#1109837 bsc#1111981 ).\n- i40e: Fix for displaying message regarding NVM version (jsc#SLE-4797).\n- i40e: Fix freeing of uninitialized misc IRQ vector (bsc#1101816 ).\n- i40e: Fix ping is lost after configuring ADq on VF (bsc#1094978).\n- i40e: Fix pre-set max number of queues for VF (bsc#1111981 ).\n- i40e: Increase delay to 1 s after global EMP reset (bsc#1101816 ).\n- iavf: Fix limit of total number of queues to active queues of VF (bsc#1111981).\n- iavf: prevent accidental free of filter structure (bsc#1111981 ).\n- ibmvnic: Allow queueing resets during probe (bsc#1196516 ltc#196391).\n- ibmvnic: Update driver return codes (bsc#1196516 ltc#196391).\n- ibmvnic: clear fop when retrying probe (bsc#1196516 ltc#196391).\n- ibmvnic: complete init_done on transport events (bsc#1196516 ltc#196391).\n- ibmvnic: define flush_reset_queue helper (bsc#1196516 ltc#196391).\n- ibmvnic: free reset-work-item when flushing (bsc#1196516 ltc#196391).\n- ibmvnic: init init_done_rc earlier (bsc#1196516 ltc#196391).\n- ibmvnic: initialize rc before completing wait (bsc#1196516 ltc#196391).\n- ibmvnic: register netdev after init of adapter (bsc#1196516 ltc#196391).\n- ibmvnic: schedule failover only if vioctl fails (bsc#1196400 ltc#195815).\n- ice: Delete always true check of PF pointer (bsc#1118661 ).\n- ice: ignore dropped packets during init (bsc#1118661 ).\n- igb: Fix removal of unicast MAC filters of VFs (bsc#1117495).\n- ixgbevf: Require large buffers for build_skb on 82599VF (bsc#1101674).\n- kabi: Hide changes to s390/AP structures (jsc#SLE-20809).\n- lib/iov_iter: initialize \u0027flags\u0027 in new pipe_buffer (bsc#1196584).\n- mqprio: Correct stats in mqprio_dump_class_stats() (bsc#1109837).\n- net/ibmvnic: Cleanup workaround doing an EOI after partition migration (bsc#1089644 ltc#166495 ltc#165544 git-fixes).\n- net: Prevent infinite while loop in skb_tx_hash() (bsc#1109837).\n- net: ena: Fix error handling when calculating max IO queues number (bsc#1174852).\n- net: ena: Fix undefined state when tx request id is out of bounds (bsc#1174852).\n- net: marvell: mvpp2: Fix the computation of shared CPUs (bsc#1119113).\n- net: phylink: avoid mvneta warning when setting pause parameters (bsc#1119113).\n- net: usb: pegasus: Do not drop long Ethernet frames (git-fixes).\n- nfsd: fix use-after-free due to delegation race (git-fixes).\n- phylib: fix potential use-after-free (bsc#1119113).\n- platform/mellanox: mlxreg-io: Fix argument base in kstrtou32() call (bsc#1112374).\n- powerpc/64s: Fix debugfs_simple_attr.cocci warnings (bsc#1157038 bsc#1157923 ltc#182612 git-fixes).\n- powerpc/pseries/ddw: Revert \u0027Extend upper limit for huge DMA window for persistent memory\u0027 (bsc#1195995 ltc#196394).\n- powerpc/pseries: read the lpar name from the firmware (bsc#1187716 ltc#193451).\n- powerpc: add link stack flush mitigation status in debugfs (bsc#1157038 bsc#1157923 ltc#182612 git-fixes).\n- qed: Handle management FW error (git-fixes).\n- qed: rdma - do not wait for resources under hw error recovery flow (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- rndis_host: support Hytera digital radios (git-fixes).\n- s390/AP: support new dynamic AP bus size limit (jsc#SLE-20809).\n- s390/ap: rework crypto config info and default domain code (jsc#SLE-20809).\n- s390/cpumf: Support for CPU Measurement Facility CSVN 7 (bsc#1195080 LTC#196090).\n- s390/cpumf: Support for CPU Measurement Sampling Facility LS bit (bsc#1195080 LTC#196090).\n- s390/hypfs: include z/VM guests with access control group set (bsc#1195638 LTC#196354).\n- scsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put() (git-fixes).\n- scsi: lpfc: Fix pt2pt NVMe PRLI reject LOGO loop (bsc#1189126).\n- scsi: lpfc: Terminate string in lpfc_debugfs_nvmeio_trc_write() (git-fixes).\n- scsi: nsp_cs: Check of ioremap return value (git-fixes).\n- scsi: qedf: Fix potential dereference of NULL pointer (git-fixes).\n- scsi: qla2xxx: Add devids and conditionals for 28xx (bsc#1195823).\n- scsi: qla2xxx: Add ql2xnvme_queues module param to configure number of NVMe queues (bsc#1195823).\n- scsi: qla2xxx: Add qla2x00_async_done() for async routines (bsc#1195823).\n- scsi: qla2xxx: Add retry for exec firmware (bsc#1195823).\n- scsi: qla2xxx: Check for firmware dump already collected (bsc#1195823).\n- scsi: qla2xxx: Fix T10 PI tag escape and IP guard options for 28XX adapters (bsc#1195823).\n- scsi: qla2xxx: Fix device reconnect in loop topology (bsc#1195823).\n- scsi: qla2xxx: Fix premature hw access after PCI error (bsc#1195823).\n- scsi: qla2xxx: Fix scheduling while atomic (bsc#1195823).\n- scsi: qla2xxx: Fix stuck session in gpdb (bsc#1195823).\n- scsi: qla2xxx: Fix unmap of already freed sgl (bsc#1195823).\n- scsi: qla2xxx: Fix warning for missing error code (bsc#1195823).\n- scsi: qla2xxx: Fix warning message due to adisc being flushed (bsc#1195823).\n- scsi: qla2xxx: Fix wrong FDMI data for 64G adapter (bsc#1195823).\n- scsi: qla2xxx: Implement ref count for SRB (bsc#1195823).\n- scsi: qla2xxx: Refactor asynchronous command initialization (bsc#1195823).\n- scsi: qla2xxx: Remove a declaration (bsc#1195823).\n- scsi: qla2xxx: Remove unused qla_sess_op_cmd_list from scsi_qla_host_t (bsc#1195823).\n- scsi: qla2xxx: Return -ENOMEM if kzalloc() fails (bsc#1195823).\n- scsi: qla2xxx: Suppress a kernel complaint in qla_create_qpair() (bsc#1195823).\n- scsi: qla2xxx: Update version to 10.02.07.300-k (bsc#1195823).\n- scsi: qla2xxx: edif: Fix clang warning (bsc#1195823).\n- scsi: qla2xxx: edif: Fix inconsistent check of db_flags (bsc#1195823).\n- scsi: qla2xxx: edif: Reduce connection thrash (bsc#1195823).\n- scsi: qla2xxx: edif: Replace list_for_each_safe with list_for_each_entry_safe (bsc#1195823).\n- scsi: qla2xxx: edif: Tweak trace message (bsc#1195823).\n- scsi: scsi_debug: Sanity check block descriptor length in resp_mode_select() (git-fixes).\n- scsi: ufs: Fix race conditions related to driver data (git-fixes).\n- scsi: zfcp: Fix failed recovery on gone remote port with non-NPIV FCP devices (bsc#1195377 LTC#196245).\n- sunrpc/auth_gss: support timeout on gss upcalls (bsc#1193857).\n- tracing: Dump stacktrace trigger to the corresponding instance (git-fixes).\n- tracing: Have traceon and traceoff trigger honor the instance (git-fixes).\n- usb: common: ulpi: Fix crash in ulpi_match() (git-fixes).\n- usb: typec: tcpm: Do not disconnect while receiving VBUS off (git-fixes).\n- xfrm: fix MTU regression (bsc#1185377, bsc#1194048).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-767,SUSE-SLE-HA-12-SP5-2022-767,SUSE-SLE-Live-Patching-12-SP5-2022-767,SUSE-SLE-SDK-12-SP5-2022-767,SUSE-SLE-SERVER-12-SP5-2022-767,SUSE-SLE-WE-12-SP5-2022-767", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0767-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:0767-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220767-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:0767-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010399.html" }, { "category": "self", "summary": "SUSE Bug 1046306", "url": "https://bugzilla.suse.com/1046306" }, { "category": "self", "summary": "SUSE Bug 1050244", "url": "https://bugzilla.suse.com/1050244" }, { "category": "self", "summary": "SUSE Bug 1089644", "url": "https://bugzilla.suse.com/1089644" }, { "category": "self", "summary": "SUSE Bug 1094978", "url": "https://bugzilla.suse.com/1094978" }, { "category": "self", "summary": "SUSE Bug 1097583", "url": "https://bugzilla.suse.com/1097583" }, { "category": "self", "summary": "SUSE Bug 1097584", "url": "https://bugzilla.suse.com/1097584" }, { "category": "self", "summary": "SUSE Bug 1097585", "url": "https://bugzilla.suse.com/1097585" }, { "category": "self", "summary": "SUSE Bug 1097586", "url": "https://bugzilla.suse.com/1097586" }, { "category": "self", "summary": "SUSE Bug 1097587", "url": "https://bugzilla.suse.com/1097587" }, { "category": "self", "summary": "SUSE Bug 1097588", "url": "https://bugzilla.suse.com/1097588" }, { "category": "self", "summary": "SUSE Bug 1101674", "url": "https://bugzilla.suse.com/1101674" }, { "category": "self", "summary": "SUSE Bug 1101816", "url": "https://bugzilla.suse.com/1101816" }, { "category": "self", "summary": "SUSE Bug 1103991", "url": "https://bugzilla.suse.com/1103991" }, { "category": "self", "summary": "SUSE Bug 1109837", "url": "https://bugzilla.suse.com/1109837" }, { "category": "self", "summary": "SUSE Bug 1111981", "url": "https://bugzilla.suse.com/1111981" }, { "category": "self", "summary": "SUSE Bug 1112374", "url": "https://bugzilla.suse.com/1112374" }, { "category": "self", "summary": "SUSE Bug 1114648", "url": "https://bugzilla.suse.com/1114648" }, { "category": "self", "summary": "SUSE Bug 1114685", "url": "https://bugzilla.suse.com/1114685" }, { "category": "self", "summary": "SUSE Bug 1114893", "url": "https://bugzilla.suse.com/1114893" }, { "category": "self", "summary": "SUSE Bug 1117495", "url": "https://bugzilla.suse.com/1117495" }, { "category": "self", "summary": "SUSE Bug 1118661", "url": "https://bugzilla.suse.com/1118661" }, { "category": "self", "summary": "SUSE Bug 1119113", "url": "https://bugzilla.suse.com/1119113" }, { "category": "self", "summary": "SUSE Bug 1136460", "url": "https://bugzilla.suse.com/1136460" }, { "category": "self", "summary": "SUSE Bug 1136461", "url": "https://bugzilla.suse.com/1136461" }, { "category": "self", "summary": "SUSE Bug 1157038", "url": "https://bugzilla.suse.com/1157038" }, { "category": "self", "summary": "SUSE Bug 1157923", "url": "https://bugzilla.suse.com/1157923" }, { "category": "self", "summary": "SUSE Bug 1158533", "url": "https://bugzilla.suse.com/1158533" }, { "category": "self", "summary": "SUSE Bug 1174852", "url": "https://bugzilla.suse.com/1174852" }, { "category": "self", "summary": "SUSE Bug 1185377", "url": "https://bugzilla.suse.com/1185377" }, { "category": "self", "summary": "SUSE Bug 1185973", "url": "https://bugzilla.suse.com/1185973" }, { "category": "self", "summary": "SUSE Bug 1187716", "url": "https://bugzilla.suse.com/1187716" }, { "category": "self", "summary": "SUSE Bug 1189126", "url": "https://bugzilla.suse.com/1189126" }, { "category": "self", "summary": "SUSE Bug 1191271", "url": "https://bugzilla.suse.com/1191271" }, { "category": "self", "summary": "SUSE Bug 1191580", "url": "https://bugzilla.suse.com/1191580" }, { "category": "self", "summary": "SUSE Bug 1191655", "url": "https://bugzilla.suse.com/1191655" }, { "category": "self", "summary": "SUSE Bug 1193857", "url": "https://bugzilla.suse.com/1193857" }, { "category": "self", "summary": "SUSE Bug 1193867", "url": "https://bugzilla.suse.com/1193867" }, { "category": "self", "summary": "SUSE Bug 1194048", "url": "https://bugzilla.suse.com/1194048" }, { "category": "self", "summary": "SUSE Bug 1194516", "url": "https://bugzilla.suse.com/1194516" }, { "category": "self", "summary": "SUSE Bug 1195080", "url": "https://bugzilla.suse.com/1195080" }, { "category": "self", "summary": "SUSE Bug 1195377", "url": "https://bugzilla.suse.com/1195377" }, { "category": "self", "summary": "SUSE Bug 1195536", "url": "https://bugzilla.suse.com/1195536" }, { "category": "self", "summary": "SUSE Bug 1195543", "url": "https://bugzilla.suse.com/1195543" }, { "category": "self", "summary": "SUSE Bug 1195612", "url": "https://bugzilla.suse.com/1195612" }, { "category": "self", "summary": "SUSE Bug 1195638", "url": "https://bugzilla.suse.com/1195638" }, { "category": "self", "summary": "SUSE Bug 1195795", "url": "https://bugzilla.suse.com/1195795" }, { "category": "self", "summary": "SUSE Bug 1195823", "url": "https://bugzilla.suse.com/1195823" }, { "category": "self", "summary": "SUSE Bug 1195840", "url": "https://bugzilla.suse.com/1195840" }, { "category": "self", "summary": "SUSE Bug 1195897", "url": "https://bugzilla.suse.com/1195897" }, { "category": "self", "summary": "SUSE Bug 1195908", "url": "https://bugzilla.suse.com/1195908" }, { "category": "self", "summary": "SUSE Bug 1195934", "url": "https://bugzilla.suse.com/1195934" }, { "category": "self", "summary": "SUSE Bug 1195949", "url": "https://bugzilla.suse.com/1195949" }, { "category": "self", "summary": "SUSE Bug 1195987", "url": "https://bugzilla.suse.com/1195987" }, { "category": "self", "summary": "SUSE Bug 1195995", "url": "https://bugzilla.suse.com/1195995" }, { "category": "self", "summary": "SUSE Bug 1196079", "url": "https://bugzilla.suse.com/1196079" }, { "category": "self", "summary": "SUSE Bug 1196155", "url": "https://bugzilla.suse.com/1196155" }, { "category": "self", "summary": "SUSE Bug 1196400", "url": "https://bugzilla.suse.com/1196400" }, { "category": "self", "summary": "SUSE Bug 1196516", "url": "https://bugzilla.suse.com/1196516" }, { "category": "self", "summary": "SUSE Bug 1196584", "url": "https://bugzilla.suse.com/1196584" }, { "category": "self", "summary": "SUSE Bug 1196612", "url": "https://bugzilla.suse.com/1196612" }, { "category": "self", "summary": "SUSE CVE CVE-2021-44879 page", "url": "https://www.suse.com/security/cve/CVE-2021-44879/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-45095 page", "url": "https://www.suse.com/security/cve/CVE-2021-45095/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0001 page", "url": "https://www.suse.com/security/cve/CVE-2022-0001/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0002 page", "url": "https://www.suse.com/security/cve/CVE-2022-0002/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0487 page", "url": "https://www.suse.com/security/cve/CVE-2022-0487/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0492 page", "url": "https://www.suse.com/security/cve/CVE-2022-0492/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0617 page", "url": "https://www.suse.com/security/cve/CVE-2022-0617/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0644 page", "url": "https://www.suse.com/security/cve/CVE-2022-0644/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0847 page", "url": "https://www.suse.com/security/cve/CVE-2022-0847/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-24448 page", "url": "https://www.suse.com/security/cve/CVE-2022-24448/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-24959 page", "url": "https://www.suse.com/security/cve/CVE-2022-24959/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2022-03-09T10:21:52Z", "generator": { "date": "2022-03-09T10:21:52Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:0767-1", "initial_release_date": "2022-03-09T10:21:52Z", "revision_history": [ { "date": "2022-03-09T10:21:52Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-122.113.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.12.14-122.113.1.aarch64", "product_id": "cluster-md-kmp-default-4.12.14-122.113.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-122.113.1.aarch64", "product": { "name": "dlm-kmp-default-4.12.14-122.113.1.aarch64", "product_id": "dlm-kmp-default-4.12.14-122.113.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-122.113.1.aarch64", "product": { "name": "gfs2-kmp-default-4.12.14-122.113.1.aarch64", "product_id": "gfs2-kmp-default-4.12.14-122.113.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-122.113.1.aarch64", "product": { "name": "kernel-default-4.12.14-122.113.1.aarch64", "product_id": "kernel-default-4.12.14-122.113.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-122.113.1.aarch64", "product": { "name": "kernel-default-base-4.12.14-122.113.1.aarch64", "product_id": "kernel-default-base-4.12.14-122.113.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-122.113.1.aarch64", "product": { "name": "kernel-default-devel-4.12.14-122.113.1.aarch64", "product_id": "kernel-default-devel-4.12.14-122.113.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-122.113.1.aarch64", "product": { "name": "kernel-default-extra-4.12.14-122.113.1.aarch64", "product_id": "kernel-default-extra-4.12.14-122.113.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-122.113.1.aarch64", "product": { "name": "kernel-default-kgraft-4.12.14-122.113.1.aarch64", "product_id": "kernel-default-kgraft-4.12.14-122.113.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-122.113.1.aarch64", "product": { "name": "kernel-default-kgraft-devel-4.12.14-122.113.1.aarch64", "product_id": "kernel-default-kgraft-devel-4.12.14-122.113.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-122.113.1.aarch64", "product": { "name": "kernel-obs-build-4.12.14-122.113.1.aarch64", "product_id": "kernel-obs-build-4.12.14-122.113.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-122.113.1.aarch64", "product": { "name": "kernel-obs-qa-4.12.14-122.113.1.aarch64", "product_id": "kernel-obs-qa-4.12.14-122.113.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-122.113.1.aarch64", "product": { "name": "kernel-syms-4.12.14-122.113.1.aarch64", "product_id": "kernel-syms-4.12.14-122.113.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-122.113.1.aarch64", "product": { "name": "kernel-vanilla-4.12.14-122.113.1.aarch64", "product_id": "kernel-vanilla-4.12.14-122.113.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-122.113.1.aarch64", "product": { "name": "kernel-vanilla-base-4.12.14-122.113.1.aarch64", "product_id": "kernel-vanilla-base-4.12.14-122.113.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-122.113.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.12.14-122.113.1.aarch64", "product_id": "kernel-vanilla-devel-4.12.14-122.113.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-122.113.1.aarch64", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-122.113.1.aarch64", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.113.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-122.113.1.aarch64", "product": { "name": "kselftests-kmp-default-4.12.14-122.113.1.aarch64", "product_id": "kselftests-kmp-default-4.12.14-122.113.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-122.113.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.12.14-122.113.1.aarch64", "product_id": "ocfs2-kmp-default-4.12.14-122.113.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-122.113.1.noarch", "product": { "name": "kernel-devel-4.12.14-122.113.1.noarch", "product_id": "kernel-devel-4.12.14-122.113.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-122.113.1.noarch", "product": { "name": "kernel-docs-4.12.14-122.113.1.noarch", "product_id": "kernel-docs-4.12.14-122.113.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-122.113.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-122.113.1.noarch", "product_id": "kernel-docs-html-4.12.14-122.113.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-122.113.1.noarch", "product": { "name": "kernel-macros-4.12.14-122.113.1.noarch", "product_id": "kernel-macros-4.12.14-122.113.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-122.113.1.noarch", "product": { "name": "kernel-source-4.12.14-122.113.1.noarch", "product_id": "kernel-source-4.12.14-122.113.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-122.113.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-122.113.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-122.113.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-122.113.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.12.14-122.113.1.ppc64le", "product_id": "cluster-md-kmp-default-4.12.14-122.113.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-122.113.1.ppc64le", "product": { "name": "dlm-kmp-default-4.12.14-122.113.1.ppc64le", "product_id": "dlm-kmp-default-4.12.14-122.113.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-122.113.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.12.14-122.113.1.ppc64le", "product_id": "gfs2-kmp-default-4.12.14-122.113.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-122.113.1.ppc64le", "product": { "name": "kernel-debug-4.12.14-122.113.1.ppc64le", "product_id": "kernel-debug-4.12.14-122.113.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-122.113.1.ppc64le", "product": { "name": "kernel-debug-base-4.12.14-122.113.1.ppc64le", "product_id": "kernel-debug-base-4.12.14-122.113.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-122.113.1.ppc64le", "product": { "name": "kernel-debug-devel-4.12.14-122.113.1.ppc64le", "product_id": "kernel-debug-devel-4.12.14-122.113.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-kgraft-devel-4.12.14-122.113.1.ppc64le", "product": { "name": "kernel-debug-kgraft-devel-4.12.14-122.113.1.ppc64le", "product_id": "kernel-debug-kgraft-devel-4.12.14-122.113.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.12.14-122.113.1.ppc64le", "product": { "name": "kernel-default-4.12.14-122.113.1.ppc64le", "product_id": "kernel-default-4.12.14-122.113.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-122.113.1.ppc64le", "product": { "name": "kernel-default-base-4.12.14-122.113.1.ppc64le", "product_id": "kernel-default-base-4.12.14-122.113.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-122.113.1.ppc64le", "product": { "name": "kernel-default-devel-4.12.14-122.113.1.ppc64le", "product_id": "kernel-default-devel-4.12.14-122.113.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-122.113.1.ppc64le", "product": { "name": "kernel-default-extra-4.12.14-122.113.1.ppc64le", "product_id": "kernel-default-extra-4.12.14-122.113.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-122.113.1.ppc64le", "product": { "name": "kernel-default-kgraft-4.12.14-122.113.1.ppc64le", "product_id": "kernel-default-kgraft-4.12.14-122.113.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-122.113.1.ppc64le", "product": { "name": "kernel-default-kgraft-devel-4.12.14-122.113.1.ppc64le", "product_id": "kernel-default-kgraft-devel-4.12.14-122.113.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-122.113.1.ppc64le", "product": { "name": "kernel-obs-build-4.12.14-122.113.1.ppc64le", "product_id": "kernel-obs-build-4.12.14-122.113.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-122.113.1.ppc64le", "product": { "name": "kernel-obs-qa-4.12.14-122.113.1.ppc64le", "product_id": "kernel-obs-qa-4.12.14-122.113.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-122.113.1.ppc64le", "product": { "name": "kernel-syms-4.12.14-122.113.1.ppc64le", "product_id": "kernel-syms-4.12.14-122.113.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-122.113.1.ppc64le", "product": { "name": "kernel-vanilla-4.12.14-122.113.1.ppc64le", "product_id": "kernel-vanilla-4.12.14-122.113.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-122.113.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.12.14-122.113.1.ppc64le", "product_id": "kernel-vanilla-base-4.12.14-122.113.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-122.113.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.12.14-122.113.1.ppc64le", "product_id": "kernel-vanilla-devel-4.12.14-122.113.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-122.113.1.ppc64le", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-122.113.1.ppc64le", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.113.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_113-default-1-8.3.1.ppc64le", "product": { "name": "kgraft-patch-4_12_14-122_113-default-1-8.3.1.ppc64le", "product_id": "kgraft-patch-4_12_14-122_113-default-1-8.3.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-122.113.1.ppc64le", "product": { "name": "kselftests-kmp-default-4.12.14-122.113.1.ppc64le", "product_id": "kselftests-kmp-default-4.12.14-122.113.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-122.113.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.12.14-122.113.1.ppc64le", "product_id": "ocfs2-kmp-default-4.12.14-122.113.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-122.113.1.s390x", "product": { "name": "cluster-md-kmp-default-4.12.14-122.113.1.s390x", "product_id": "cluster-md-kmp-default-4.12.14-122.113.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-122.113.1.s390x", "product": { "name": "dlm-kmp-default-4.12.14-122.113.1.s390x", "product_id": "dlm-kmp-default-4.12.14-122.113.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-122.113.1.s390x", "product": { "name": "gfs2-kmp-default-4.12.14-122.113.1.s390x", "product_id": "gfs2-kmp-default-4.12.14-122.113.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.12.14-122.113.1.s390x", "product": { "name": "kernel-default-4.12.14-122.113.1.s390x", "product_id": "kernel-default-4.12.14-122.113.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-122.113.1.s390x", "product": { "name": "kernel-default-base-4.12.14-122.113.1.s390x", "product_id": "kernel-default-base-4.12.14-122.113.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-122.113.1.s390x", "product": { "name": "kernel-default-devel-4.12.14-122.113.1.s390x", "product_id": "kernel-default-devel-4.12.14-122.113.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-122.113.1.s390x", "product": { "name": "kernel-default-extra-4.12.14-122.113.1.s390x", "product_id": "kernel-default-extra-4.12.14-122.113.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-122.113.1.s390x", "product": { "name": "kernel-default-kgraft-4.12.14-122.113.1.s390x", "product_id": "kernel-default-kgraft-4.12.14-122.113.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-122.113.1.s390x", "product": { "name": "kernel-default-kgraft-devel-4.12.14-122.113.1.s390x", "product_id": "kernel-default-kgraft-devel-4.12.14-122.113.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.12.14-122.113.1.s390x", "product": { "name": "kernel-default-man-4.12.14-122.113.1.s390x", "product_id": "kernel-default-man-4.12.14-122.113.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-122.113.1.s390x", "product": { "name": "kernel-obs-build-4.12.14-122.113.1.s390x", "product_id": "kernel-obs-build-4.12.14-122.113.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-122.113.1.s390x", "product": { "name": "kernel-obs-qa-4.12.14-122.113.1.s390x", "product_id": "kernel-obs-qa-4.12.14-122.113.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-122.113.1.s390x", "product": { "name": "kernel-syms-4.12.14-122.113.1.s390x", "product_id": "kernel-syms-4.12.14-122.113.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-122.113.1.s390x", "product": { "name": "kernel-vanilla-4.12.14-122.113.1.s390x", "product_id": "kernel-vanilla-4.12.14-122.113.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-122.113.1.s390x", "product": { "name": "kernel-vanilla-base-4.12.14-122.113.1.s390x", "product_id": "kernel-vanilla-base-4.12.14-122.113.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-122.113.1.s390x", "product": { "name": "kernel-vanilla-devel-4.12.14-122.113.1.s390x", "product_id": "kernel-vanilla-devel-4.12.14-122.113.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-122.113.1.s390x", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-122.113.1.s390x", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.113.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.12.14-122.113.1.s390x", "product": { "name": "kernel-zfcpdump-4.12.14-122.113.1.s390x", "product_id": "kernel-zfcpdump-4.12.14-122.113.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-man-4.12.14-122.113.1.s390x", "product": { "name": "kernel-zfcpdump-man-4.12.14-122.113.1.s390x", "product_id": "kernel-zfcpdump-man-4.12.14-122.113.1.s390x" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_113-default-1-8.3.1.s390x", "product": { "name": "kgraft-patch-4_12_14-122_113-default-1-8.3.1.s390x", "product_id": "kgraft-patch-4_12_14-122_113-default-1-8.3.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-122.113.1.s390x", "product": { "name": "kselftests-kmp-default-4.12.14-122.113.1.s390x", "product_id": "kselftests-kmp-default-4.12.14-122.113.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-122.113.1.s390x", "product": { "name": "ocfs2-kmp-default-4.12.14-122.113.1.s390x", "product_id": "ocfs2-kmp-default-4.12.14-122.113.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-122.113.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.12.14-122.113.1.x86_64", "product_id": "cluster-md-kmp-default-4.12.14-122.113.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-122.113.1.x86_64", "product": { "name": "dlm-kmp-default-4.12.14-122.113.1.x86_64", "product_id": "dlm-kmp-default-4.12.14-122.113.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-122.113.1.x86_64", "product": { "name": "gfs2-kmp-default-4.12.14-122.113.1.x86_64", "product_id": "gfs2-kmp-default-4.12.14-122.113.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-122.113.1.x86_64", "product": { "name": "kernel-debug-4.12.14-122.113.1.x86_64", "product_id": "kernel-debug-4.12.14-122.113.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-122.113.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-122.113.1.x86_64", "product_id": "kernel-debug-base-4.12.14-122.113.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-122.113.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-122.113.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-122.113.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-kgraft-devel-4.12.14-122.113.1.x86_64", "product": { "name": "kernel-debug-kgraft-devel-4.12.14-122.113.1.x86_64", "product_id": "kernel-debug-kgraft-devel-4.12.14-122.113.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-122.113.1.x86_64", "product": { "name": "kernel-default-4.12.14-122.113.1.x86_64", "product_id": "kernel-default-4.12.14-122.113.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-122.113.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-122.113.1.x86_64", "product_id": "kernel-default-base-4.12.14-122.113.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-122.113.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-122.113.1.x86_64", "product_id": "kernel-default-devel-4.12.14-122.113.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-122.113.1.x86_64", "product": { "name": "kernel-default-extra-4.12.14-122.113.1.x86_64", "product_id": "kernel-default-extra-4.12.14-122.113.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-122.113.1.x86_64", "product": { "name": "kernel-default-kgraft-4.12.14-122.113.1.x86_64", "product_id": "kernel-default-kgraft-4.12.14-122.113.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-122.113.1.x86_64", "product": { "name": "kernel-default-kgraft-devel-4.12.14-122.113.1.x86_64", "product_id": "kernel-default-kgraft-devel-4.12.14-122.113.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-122.113.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-122.113.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-122.113.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-122.113.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-122.113.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-122.113.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-122.113.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-122.113.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-122.113.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-kgraft-devel-4.12.14-122.113.1.x86_64", "product": { "name": "kernel-kvmsmall-kgraft-devel-4.12.14-122.113.1.x86_64", "product_id": "kernel-kvmsmall-kgraft-devel-4.12.14-122.113.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-122.113.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-122.113.1.x86_64", "product_id": "kernel-obs-build-4.12.14-122.113.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-122.113.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-122.113.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-122.113.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-122.113.1.x86_64", "product": { "name": "kernel-syms-4.12.14-122.113.1.x86_64", "product_id": "kernel-syms-4.12.14-122.113.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-122.113.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-122.113.1.x86_64", "product_id": "kernel-vanilla-4.12.14-122.113.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-122.113.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-122.113.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-122.113.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-122.113.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-122.113.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-122.113.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-122.113.1.x86_64", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-122.113.1.x86_64", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.113.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_113-default-1-8.3.1.x86_64", "product": { "name": "kgraft-patch-4_12_14-122_113-default-1-8.3.1.x86_64", "product_id": "kgraft-patch-4_12_14-122_113-default-1-8.3.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-122.113.1.x86_64", "product": { "name": "kselftests-kmp-default-4.12.14-122.113.1.x86_64", "product_id": "kselftests-kmp-default-4.12.14-122.113.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-122.113.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.12.14-122.113.1.x86_64", "product_id": "ocfs2-kmp-default-4.12.14-122.113.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 12 SP5", "product": { "name": "SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP5", "product": { "name": "SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 12 SP5", "product": { "name": "SUSE Linux Enterprise Workstation Extension 12 SP5", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-122.113.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.12.14-122.113.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-122.113.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.12.14-122.113.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-122.113.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.12.14-122.113.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-122.113.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.12.14-122.113.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-122.113.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.s390x" }, "product_reference": "dlm-kmp-default-4.12.14-122.113.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-122.113.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.x86_64" }, "product_reference": "dlm-kmp-default-4.12.14-122.113.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-122.113.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.12.14-122.113.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-122.113.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.s390x" }, "product_reference": "gfs2-kmp-default-4.12.14-122.113.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-122.113.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.12.14-122.113.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-122.113.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.12.14-122.113.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-122.113.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.12.14-122.113.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-122.113.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.12.14-122.113.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-122.113.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.ppc64le" }, "product_reference": "kernel-default-kgraft-4.12.14-122.113.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-122.113.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.s390x" }, "product_reference": "kernel-default-kgraft-4.12.14-122.113.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-122.113.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.x86_64" }, "product_reference": "kernel-default-kgraft-4.12.14-122.113.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-122.113.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.ppc64le" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-122.113.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-122.113.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.s390x" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-122.113.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-122.113.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.x86_64" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-122.113.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_113-default-1-8.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_113-default-1-8.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_113-default-1-8.3.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_113-default-1-8.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_113-default-1-8.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_113-default-1-8.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-122.113.1.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.113.1.noarch" }, "product_reference": "kernel-docs-4.12.14-122.113.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-122.113.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-122.113.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-122.113.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.ppc64le" }, "product_reference": "kernel-obs-build-4.12.14-122.113.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-122.113.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.s390x" }, "product_reference": "kernel-obs-build-4.12.14-122.113.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-122.113.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-122.113.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.113.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.aarch64" }, "product_reference": "kernel-default-4.12.14-122.113.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.113.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-122.113.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.113.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.s390x" }, "product_reference": "kernel-default-4.12.14-122.113.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.113.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.x86_64" }, "product_reference": "kernel-default-4.12.14-122.113.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.113.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-122.113.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.113.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-122.113.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.113.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-122.113.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.113.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-122.113.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.113.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-122.113.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.113.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-122.113.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.113.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-122.113.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.113.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-122.113.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-122.113.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.113.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-122.113.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-122.113.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.113.1.noarch" }, "product_reference": "kernel-devel-4.12.14-122.113.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-122.113.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.113.1.noarch" }, "product_reference": "kernel-macros-4.12.14-122.113.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-122.113.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.113.1.noarch" }, "product_reference": "kernel-source-4.12.14-122.113.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.113.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-122.113.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.113.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-122.113.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.113.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.s390x" }, "product_reference": "kernel-syms-4.12.14-122.113.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.113.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-122.113.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.113.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.aarch64" }, "product_reference": "kernel-default-4.12.14-122.113.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.113.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-122.113.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.113.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.s390x" }, "product_reference": "kernel-default-4.12.14-122.113.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.113.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.x86_64" }, "product_reference": "kernel-default-4.12.14-122.113.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.113.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-122.113.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.113.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-122.113.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.113.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-122.113.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.113.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-122.113.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.113.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-122.113.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.113.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-122.113.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.113.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-122.113.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.113.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-122.113.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-122.113.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.113.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-122.113.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-122.113.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.113.1.noarch" }, "product_reference": "kernel-devel-4.12.14-122.113.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-122.113.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.113.1.noarch" }, "product_reference": "kernel-macros-4.12.14-122.113.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-122.113.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.113.1.noarch" }, "product_reference": "kernel-source-4.12.14-122.113.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.113.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-122.113.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.113.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-122.113.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.113.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.s390x" }, "product_reference": "kernel-syms-4.12.14-122.113.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.113.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-122.113.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-4.12.14-122.113.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP5", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.113.1.x86_64" }, "product_reference": "kernel-default-extra-4.12.14-122.113.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-44879", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-44879" } ], "notes": [ { "category": "general", "text": "In gc_data_segment in fs/f2fs/gc.c in the Linux kernel before 5.16.3, special files are not considered, leading to a move_data_page NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.113.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-44879", "url": "https://www.suse.com/security/cve/CVE-2021-44879" }, { "category": "external", "summary": "SUSE Bug 1195987 for CVE-2021-44879", "url": "https://bugzilla.suse.com/1195987" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.113.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.113.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T10:21:52Z", "details": "moderate" } ], "title": "CVE-2021-44879" }, { "cve": "CVE-2021-45095", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-45095" } ], "notes": [ { "category": "general", "text": "pep_sock_accept in net/phonet/pep.c in the Linux kernel through 5.15.8 has a refcount leak.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.113.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-45095", "url": "https://www.suse.com/security/cve/CVE-2021-45095" }, { "category": "external", "summary": "SUSE Bug 1193867 for CVE-2021-45095", "url": "https://bugzilla.suse.com/1193867" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.113.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.113.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T10:21:52Z", "details": "moderate" } ], "title": "CVE-2021-45095" }, { "cve": "CVE-2022-0001", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0001" } ], "notes": [ { "category": "general", "text": "Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.113.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0001", "url": "https://www.suse.com/security/cve/CVE-2022-0001" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2022-0001", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2022-0001", "url": "https://bugzilla.suse.com/1196901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.113.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.113.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T10:21:52Z", "details": "moderate" } ], "title": "CVE-2022-0001" }, { "cve": "CVE-2022-0002", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0002" } ], "notes": [ { "category": "general", "text": "Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.113.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0002", "url": "https://www.suse.com/security/cve/CVE-2022-0002" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2022-0002", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2022-0002", "url": "https://bugzilla.suse.com/1196901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.113.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.113.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T10:21:52Z", "details": "moderate" } ], "title": "CVE-2022-0002" }, { "cve": "CVE-2022-0487", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0487" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove in drivers/memstick/host/rtsx_usb_ms.c in memstick in the Linux kernel. In this flaw, a local attacker with a user privilege may impact system Confidentiality. This flaw affects kernel versions prior to 5.14 rc1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.113.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0487", "url": "https://www.suse.com/security/cve/CVE-2022-0487" }, { "category": "external", "summary": "SUSE Bug 1194516 for CVE-2022-0487", "url": "https://bugzilla.suse.com/1194516" }, { "category": "external", "summary": "SUSE Bug 1195949 for CVE-2022-0487", "url": "https://bugzilla.suse.com/1195949" }, { "category": "external", "summary": "SUSE Bug 1198615 for CVE-2022-0487", "url": "https://bugzilla.suse.com/1198615" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.113.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.113.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T10:21:52Z", "details": "moderate" } ], "title": "CVE-2022-0487" }, { "cve": "CVE-2022-0492", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0492" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in the Linux kernel\u0027s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.113.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0492", "url": "https://www.suse.com/security/cve/CVE-2022-0492" }, { "category": "external", "summary": "SUSE Bug 1195543 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1195543" }, { "category": "external", "summary": "SUSE Bug 1195908 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1195908" }, { "category": "external", "summary": "SUSE Bug 1196612 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1196612" }, { "category": "external", "summary": "SUSE Bug 1196776 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1196776" }, { "category": "external", "summary": "SUSE Bug 1198615 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1198615" }, { "category": "external", "summary": "SUSE Bug 1199255 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1199255" }, { "category": "external", "summary": "SUSE Bug 1199615 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1199615" }, { "category": "external", "summary": "SUSE Bug 1200084 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1200084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.113.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.113.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T10:21:52Z", "details": "moderate" } ], "title": "CVE-2022-0492" }, { "cve": "CVE-2022-0617", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0617" } ], "notes": [ { "category": "general", "text": "A flaw null pointer dereference in the Linux kernel UDF file system functionality was found in the way user triggers udf_file_write_iter function for the malicious UDF image. A local user could use this flaw to crash the system. Actual from Linux kernel 4.2-rc1 till 5.17-rc2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.113.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0617", "url": "https://www.suse.com/security/cve/CVE-2022-0617" }, { "category": "external", "summary": "SUSE Bug 1196079 for CVE-2022-0617", "url": "https://bugzilla.suse.com/1196079" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.113.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.113.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T10:21:52Z", "details": "moderate" } ], "title": "CVE-2022-0617" }, { "cve": "CVE-2022-0644", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0644" } ], "notes": [ { "category": "general", "text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.113.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0644", "url": "https://www.suse.com/security/cve/CVE-2022-0644" }, { "category": "external", "summary": "SUSE Bug 1196155 for CVE-2022-0644", "url": "https://bugzilla.suse.com/1196155" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.113.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.113.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T10:21:52Z", "details": "moderate" } ], "title": "CVE-2022-0644" }, { "cve": "CVE-2022-0847", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0847" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way the \"flags\" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.113.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0847", "url": "https://www.suse.com/security/cve/CVE-2022-0847" }, { "category": "external", "summary": "SUSE Bug 1196584 for CVE-2022-0847", "url": "https://bugzilla.suse.com/1196584" }, { "category": "external", "summary": "SUSE Bug 1196601 for CVE-2022-0847", "url": "https://bugzilla.suse.com/1196601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.113.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.113.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T10:21:52Z", "details": "important" } ], "title": "CVE-2022-0847" }, { "cve": "CVE-2022-24448", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-24448" } ], "notes": [ { "category": "general", "text": "An issue was discovered in fs/nfs/dir.c in the Linux kernel before 5.16.5. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should occur, but the server instead returns uninitialized data in the file descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.113.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-24448", "url": "https://www.suse.com/security/cve/CVE-2022-24448" }, { "category": "external", "summary": "SUSE Bug 1195612 for CVE-2022-24448", "url": "https://bugzilla.suse.com/1195612" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.113.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.113.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T10:21:52Z", "details": "moderate" } ], "title": "CVE-2022-24448" }, { "cve": "CVE-2022-24959", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-24959" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.16.5. There is a memory leak in yam_siocdevprivate in drivers/net/hamradio/yam.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.113.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-24959", "url": "https://www.suse.com/security/cve/CVE-2022-24959" }, { "category": "external", "summary": "SUSE Bug 1195897 for CVE-2022-24959", "url": "https://bugzilla.suse.com/1195897" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.113.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_113-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.113.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.113.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.113.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T10:21:52Z", "details": "moderate" } ], "title": "CVE-2022-24959" } ] }
suse-su-2022:0760-1
Vulnerability from csaf_suse
Published
2022-03-08 18:07
Modified
2022-03-08 18:07
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.
Transient execution side-channel attacks attacking the Branch History Buffer (BHB),
named 'Branch Target Injection' and 'Intra-Mode Branch History Injection' are now mitigated.
The following security bugs were fixed:
- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).
- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).
- CVE-2022-0847: Fixed a vulnerability were a local attackers could overwrite data in arbitrary (read-only) files (bsc#1196584).
- CVE-2022-25375: The RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command. Attackers can obtain sensitive information from kernel memory (bnc#1196235 ).
- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
- CVE-2022-0516: Fixed missing check in ioctl related to KVM in s390 allows kernel memory read/write (bsc#1195516).
The following non-security bugs were fixed:
- ACPI/IORT: Check node revision for PMCG resources (git-fixes).
- ALSA: hda/realtek: Add missing fixup-model entry for Gigabyte X570 ALC1220 quirks (git-fixes).
- ALSA: hda/realtek: Add quirk for ASUS GU603 (git-fixes).
- ALSA: hda/realtek: Fix silent output on Gigabyte X570 Aorus Xtreme after reboot from Windows (git-fixes).
- ALSA: hda/realtek: Fix silent output on Gigabyte X570S Aorus Master (newer chipset) (git-fixes).
- ALSA: hda: Fix missing codec probe on Shenker Dock 15 (git-fixes).
- ALSA: hda: Fix regression on forced probe mask option (git-fixes).
- ASoC: Revert 'ASoC: mediatek: Check for error clk pointer' (git-fixes).
- ASoC: ops: Fix stereo change notifications in snd_soc_put_volsw() (git-fixes).
- ASoC: ops: Fix stereo change notifications in snd_soc_put_volsw_range() (git-fixes).
- ASoC: ops: Reject out of bounds values in snd_soc_put_volsw() (git-fixes).
- ASoC: ops: Reject out of bounds values in snd_soc_put_volsw_sx() (git-fixes).
- ASoC: ops: Reject out of bounds values in snd_soc_put_xr_sx() (git-fixes).
- Align s390 NVME target options with other architectures (bsc#1188404, jsc#SLE-22494).
- Drop PCI xgene patch that caused a regression for mxl4 (bsc#1195352)
- EDAC/xgene: Fix deferred probing (bsc#1178134).
- HID:Add support for UGTABLET WP5540 (git-fixes).
- IB/cma: Do not send IGMP leaves for sendonly Multicast groups (git-fixes).
- IB/hfi1: Fix AIP early init panic (jsc#SLE-13208).
- KVM: remember position in kvm->vcpus array (bsc#1190972 LTC#194674).
- NFSD: Fix the behavior of READ near OFFSET_MAX (bsc#1195957).
- PM: hibernate: Remove register_nosave_region_late() (git-fixes).
- PM: s2idle: ACPI: Fix wakeup interrupts handling (git-fixes).
- RDMA/cma: Use correct address when leaving multicast group (bsc#1181147).
- RDMA/core: Always release restrack object (git-fixes)
- RDMA/cxgb4: check for ipv6 address properly while destroying listener (git-fixes)
- RDMA/siw: Release xarray entry (git-fixes)
- RDMA/ucma: Protect mc during concurrent multicast leaves (bsc#1181147).
- USB: serial: ch341: add support for GW Instek USB2.0-Serial devices (git-fixes).
- USB: serial: cp210x: add CPI Bulk Coin Recycler id (git-fixes).
- USB: serial: cp210x: add NCR Retail IO box id (git-fixes).
- USB: serial: ftdi_sio: add support for Brainboxes US-159/235/320 (git-fixes).
- USB: serial: mos7840: remove duplicated 0xac24 device ID (git-fixes).
- USB: serial: option: add ZTE MF286D modem (git-fixes).
- ata: libata-core: Disable TRIM on M88V29 (git-fixes).
- ax25: improve the incomplete fix to avoid UAF and NPD bugs (git-fixes).
- blk-mq: always allow reserved allocation in hctx_may_queue (bsc#1193787).
- blk-mq: avoid to iterate over stale request (bsc#1193787).
- blk-mq: clear stale request in tags->rq before freeing one request pool (bsc#1193787).
- blk-mq: clearing flush request reference in tags->rqs (bsc#1193787).
- blk-mq: do not grab rq's refcount in blk_mq_check_expired() (bsc#1193787 git-fixes).
- blk-mq: fix is_flush_rq (bsc#1193787 git-fixes).
- blk-mq: fix kernel panic during iterating over flush request (bsc#1193787 git-fixes).
- blk-mq: grab rq->refcount before calling ->fn in blk_mq_tagset_busy_iter (bsc#1193787).
- blk-mq: mark flush request as IDLE in flush_end_io() (bsc#1193787).
- blk-tag: Hide spin_lock (bsc#1193787).
- block: avoid double io accounting for flush request (bsc#1193787).
- block: do not send a rezise udev event for hidden block device (bsc#1193096).
- block: mark flush request as IDLE when it is really finished (bsc#1193787).
- bonding: pair enable_port with slave_arr_updates (git-fixes).
- bpf: Adjust BTF log size limit (git-fixes).
- bpf: Disallow BPF_LOG_KERNEL log level for bpf(BPF_BTF_LOAD) (git-fixes).
- btrfs: check for missing device in btrfs_trim_fs (bsc#1195701).
- btrfs: check worker before need_preemptive_reclaim (bsc#1196195).
- btrfs: do not do preemptive flushing if the majority is global rsv (bsc#1196195).
- btrfs: do not include the global rsv size in the preemptive used amount (bsc#1196195).
- btrfs: handle preemptive delalloc flushing slightly differently (bsc#1196195).
- btrfs: make sure SB_I_VERSION does not get unset by remount (bsc#1192210).
- btrfs: only clamp the first time we have to start flushing (bsc#1196195).
- btrfs: only ignore delalloc if delalloc is much smaller than ordered (bsc#1196195).
- btrfs: reduce the preemptive flushing threshold to 90% (bsc#1196195).
- btrfs: take into account global rsv in need_preemptive_reclaim (bsc#1196195).
- btrfs: use the global rsv size in the preemptive thresh calculation (bsc#1196195).
- ceph: properly put ceph_string reference after async create attempt (bsc#1195798).
- ceph: set pool_ns in new inode layout for async creates (bsc#1195799).
- drm/amdgpu: fix logic inversion in check (git-fixes).
- drm/i915/gvt: Make DRM_I915_GVT depend on X86 (git-fixes).
- drm/i915/gvt: clean up kernel-doc in gtt.c (git-fixes).
- drm/i915/opregion: check port number bounds for SWSCI display power state (git-fixes).
- drm/i915: Correctly populate use_sagv_wm for all pipes (git-fixes).
- drm/i915: Fix bw atomic check when switching between SAGV vs. no SAGV (git-fixes).
- drm/panel: simple: Assign data from panel_dpi_probe() correctly (git-fixes).
- drm/radeon: Fix backlight control on iMac 12,1 (git-fixes).
- drm/rockchip: dw_hdmi: Do not leave clock enabled in error case (git-fixes).
- drm/rockchip: vop: Correct RK3399 VOP register fields (git-fixes).
- drm/vc4: hdmi: Allow DBLCLK modes even if horz timing is odd (git-fixes).
- drm: panel-orientation-quirks: Add quirk for the 1Netbook OneXPlayer (git-fixes).
- ext4: check for inconsistent extents between index and leaf block (bsc#1194163 bsc#1196339).
- ext4: check for out-of-order index extents in ext4_valid_extent_entries() (bsc#1194163 bsc#1196339).
- ext4: prevent partial update of the extent blocks (bsc#1194163 bsc#1196339).
- gve: Add RX context (bsc#1191655).
- gve: Add a jumbo-frame device option (bsc#1191655).
- gve: Add consumed counts to ethtool stats (bsc#1191655).
- gve: Add optional metadata descriptor type GVE_TXD_MTD (bsc#1191655).
- gve: Correct order of processing device options (bsc#1191655).
- gve: Fix GFP flags when allocing pages (git-fixes).
- gve: Fix off by one in gve_tx_timeout() (bsc#1191655).
- gve: Implement packet continuation for RX (bsc#1191655).
- gve: Implement suspend/resume/shutdown (bsc#1191655).
- gve: Move the irq db indexes out of the ntfy block struct (bsc#1191655).
- gve: Recording rx queue before sending to napi (bsc#1191655).
- gve: Recover from queue stall due to missed IRQ (bsc#1191655).
- gve: Update gve_free_queue_page_list signature (bsc#1191655).
- gve: Use kvcalloc() instead of kvzalloc() (bsc#1191655).
- gve: fix for null pointer dereference (bsc#1191655).
- gve: fix the wrong AdminQ buffer queue index check (bsc#1176940).
- gve: fix unmatched u64_stats_update_end() (bsc#1191655).
- gve: remove memory barrier around seqno (bsc#1191655).
- i2c: brcmstb: fix support for DSL and CM variants (git-fixes).
- i40e: Fix for failed to init adminq while VF reset (git-fixes).
- i40e: Fix issue when maximum queues is exceeded (git-fixes).
- i40e: Fix queues reservation for XDP (git-fixes).
- i40e: Increase delay to 1 s after global EMP reset (git-fixes).
- i40e: fix unsigned stat widths (git-fixes).
- ibmvnic: Allow queueing resets during probe (bsc#1196516 ltc#196391).
- ibmvnic: clear fop when retrying probe (bsc#1196516 ltc#196391).
- ibmvnic: complete init_done on transport events (bsc#1196516 ltc#196391).
- ibmvnic: define flush_reset_queue helper (bsc#1196516 ltc#196391).
- ibmvnic: do not release napi in __ibmvnic_open() (bsc#1195668 ltc#195811).
- ibmvnic: free reset-work-item when flushing (bsc#1196516 ltc#196391).
- ibmvnic: init init_done_rc earlier (bsc#1196516 ltc#196391).
- ibmvnic: initialize rc before completing wait (bsc#1196516 ltc#196391).
- ibmvnic: register netdev after init of adapter (bsc#1196516 ltc#196391).
- ibmvnic: schedule failover only if vioctl fails (bsc#1196400 ltc#195815).
- ice: fix IPIP and SIT TSO offload (git-fixes).
- ice: fix an error code in ice_cfg_phy_fec() (jsc#SLE-12878).
- ima: Allow template selection with ima_template[_fmt]= after ima_hash= (git-fixes).
- ima: Do not print policy rule with inactive LSM labels (git-fixes).
- ima: Remove ima_policy file before directory (git-fixes).
- integrity: Make function integrity_add_key() static (git-fixes).
- integrity: check the return value of audit_log_start() (git-fixes).
- integrity: double check iint_cache was initialized (git-fixes).
- iommu/amd: Fix loop timeout issue in iommu_ga_log_enable() (git-fixes).
- iommu/amd: Remove useless irq affinity notifier (git-fixes).
- iommu/amd: Restore GA log/tail pointer on host resume (git-fixes).
- iommu/amd: X2apic mode: mask/unmask interrupts on suspend/resume (git-fixes).
- iommu/amd: X2apic mode: re-enable after resume (git-fixes).
- iommu/amd: X2apic mode: setup the INTX registers on mask/unmask (git-fixes).
- iommu/io-pgtable-arm-v7s: Add error handle for page table allocation failure (git-fixes).
- iommu/io-pgtable-arm: Fix table descriptor paddr formatting (git-fixes).
- iommu/iova: Fix race between FQ timeout and teardown (git-fixes).
- iommu/vt-d: Fix potential memory leak in intel_setup_irq_remapping() (git-fixes).
- iwlwifi: fix use-after-free (git-fixes).
- iwlwifi: pcie: fix locking when 'HW not ready' (git-fixes).
- iwlwifi: pcie: gen2: fix locking when 'HW not ready' (git-fixes).
- ixgbevf: Require large buffers for build_skb on 82599VF (git-fixes).
- kABI fixup after adding vcpu_idx to struct kvm_cpu (bsc#1190972 LTC#194674).
- kABI: Fix kABI for AMD IOMMU driver (git-fixes).
- kabi: Hide changes to s390/AP structures (jsc#SLE-20807).
- lib/iov_iter: initialize 'flags' in new pipe_buffer (bsc#1196584).
- libsubcmd: Fix use-after-free for realloc(..., 0) (git-fixes).
- md/raid5: fix oops during stripe resizing (bsc#1181588).
- misc: fastrpc: avoid double fput() on failed usercopy (git-fixes).
- mmc: sdhci-of-esdhc: Check for error num after setting mask (git-fixes).
- mtd: rawnand: brcmnand: Fixed incorrect sub-page ECC status (git-fixes).
- mtd: rawnand: gpmi: do not leak PM reference in error path (git-fixes).
- mtd: rawnand: qcom: Fix clock sequencing in qcom_nandc_probe() (git-fixes).
- net/ibmvnic: Cleanup workaround doing an EOI after partition migration (bsc#1089644 ltc#166495 ltc#165544 git-fixes).
- net/mlx5e: Fix handling of wrong devices during bond netevent (jsc#SLE-15172).
- net: macb: Align the dma and coherent dma masks (git-fixes).
- net: mdio: aspeed: Add missing MODULE_DEVICE_TABLE (bsc#1176447).
- net: phy: marvell: Fix MDI-x polarity setting in 88e1118-compatible PHYs (git-fixes).
- net: phy: marvell: Fix RGMII Tx/Rx delays setting in 88e1121-compatible PHYs (git-fixes).
- net: phy: marvell: configure RGMII delays for 88E1118 (git-fixes).
- net: usb: qmi_wwan: Add support for Dell DW5829e (git-fixes).
- nfp: flower: fix ida_idx not being released (bsc#1154353).
- nfsd: allow delegation state ids to be revoked and then freed (bsc#1192483).
- nfsd: allow lock state ids to be revoked and then freed (bsc#1192483).
- nfsd: allow open state ids to be revoked and then freed (bsc#1192483).
- nfsd: do not admin-revoke NSv4.0 state ids (bsc#1192483).
- nfsd: prepare for supporting admin-revocation of state (bsc#1192483).
- nvme-fabrics: fix state check in nvmf_ctlr_matches_baseopts() (bsc#1195012).
- nvme: also mark passthrough-only namespaces ready in nvme_update_ns_info (git-fixes).
- nvme: do not return an error from nvme_configure_metadata (git-fixes).
- nvme: let namespace probing continue for unsupported features (git-fixes).
- powerpc/64: Move paca allocation later in boot (bsc#1190812).
- powerpc/64s: Fix debugfs_simple_attr.cocci warnings (bsc#1157038 bsc#1157923 ltc#182612 git-fixes).
- powerpc/pseries/ddw: Revert 'Extend upper limit for huge DMA window for persistent memory' (bsc#1195995 ltc#196394).
- powerpc/pseries: read the lpar name from the firmware (bsc#1187716 ltc#193451).
- powerpc: Set crashkernel offset to mid of RMA region (bsc#1190812).
- powerpc: add link stack flush mitigation status in debugfs (bsc#1157038 bsc#1157923 ltc#182612 git-fixes).
- s390/AP: support new dynamic AP bus size limit (jsc#SLE-20807).
- s390/bpf: Fix 64-bit subtraction of the -0x80000000 constant (git-fixes).
- s390/bpf: Fix optimizing out zero-extensions (git-fixes).
- s390/cio: make ccw_device_dma_* more robust (bsc#1193243 LTC#195549).
- s390/cio: verify the driver availability for path_event call (bsc#1195928 LTC#196418).
- s390/cpumf: Support for CPU Measurement Facility CSVN 7 (bsc#1195081 LTC#196088).
- s390/cpumf: Support for CPU Measurement Sampling Facility LS bit (bsc#1195081 LTC#196088).
- s390/pci: add s390_iommu_aperture kernel parameter (bsc#1193233 LTC#195540).
- s390/pci: move pseudo-MMIO to prevent MIO overlap (bsc#1194967 LTC#196028).
- s390/protvirt: fix error return code in uv_info_init() (jsc#SLE-22135).
- s390/sclp: fix Secure-IPL facility detection (bsc#1191741 LTC#194816).
- s390/uv: add prot virt guest/host indication files (jsc#SLE-22135).
- s390/uv: fix prot virt host indication compilation (jsc#SLE-22135).
- scsi: core: Add a new error code DID_TRANSPORT_MARGINAL in scsi.h (bsc#1195506).
- scsi: core: Add limitless cmd retry support (bsc#1195506).
- scsi: core: No retries on abort success (bsc#1195506).
- scsi: kABI fix for 'eh_should_retry_cmd' (bsc#1195506).
- scsi: lpfc: Add support for eh_should_retry_cmd() (bsc#1195506).
- scsi: lpfc: Fix pt2pt NVMe PRLI reject LOGO loop (bsc#1189126).
- scsi: qla2xxx: Add devids and conditionals for 28xx (bsc#1195823).
- scsi: qla2xxx: Add marginal path handling support (bsc#1195506).
- scsi: qla2xxx: Add ql2xnvme_queues module param to configure number of NVMe queues (bsc#1195823).
- scsi: qla2xxx: Add qla2x00_async_done() for async routines (bsc#1195823).
- scsi: qla2xxx: Add retry for exec firmware (bsc#1195823).
- scsi: qla2xxx: Check for firmware dump already collected (bsc#1195823).
- scsi: qla2xxx: Fix T10 PI tag escape and IP guard options for 28XX adapters (bsc#1195823).
- scsi: qla2xxx: Fix device reconnect in loop topology (bsc#1195823).
- scsi: qla2xxx: Fix premature hw access after PCI error (bsc#1195823).
- scsi: qla2xxx: Fix scheduling while atomic (bsc#1195823).
- scsi: qla2xxx: Fix stuck session in gpdb (bsc#1195823).
- scsi: qla2xxx: Fix unmap of already freed sgl (bsc#1195823).
- scsi: qla2xxx: Fix warning for missing error code (bsc#1195823).
- scsi: qla2xxx: Fix warning message due to adisc being flushed (bsc#1195823).
- scsi: qla2xxx: Fix wrong FDMI data for 64G adapter (bsc#1195823).
- scsi: qla2xxx: Implement ref count for SRB (bsc#1195823).
- scsi: qla2xxx: Refactor asynchronous command initialization (bsc#1195823).
- scsi: qla2xxx: Remove a declaration (bsc#1195823).
- scsi: qla2xxx: Remove unused qla_sess_op_cmd_list from scsi_qla_host_t (bsc#1195823).
- scsi: qla2xxx: Return -ENOMEM if kzalloc() fails (bsc#1195823).
- scsi: qla2xxx: Suppress a kernel complaint in qla_create_qpair() (bsc#1195823).
- scsi: qla2xxx: Update version to 10.02.07.200-k (bsc#1195823).
- scsi: qla2xxx: Update version to 10.02.07.300-k (bsc#1195823).
- scsi: qla2xxx: edif: Fix clang warning (bsc#1195823).
- scsi: qla2xxx: edif: Fix inconsistent check of db_flags (bsc#1195823).
- scsi: qla2xxx: edif: Reduce connection thrash (bsc#1195823).
- scsi: qla2xxx: edif: Replace list_for_each_safe with list_for_each_entry_safe (bsc#1195823).
- scsi: qla2xxx: edif: Tweak trace message (bsc#1195823).
- scsi: scsi_transport_fc: Add a new rport state FC_PORTSTATE_MARGINAL (bsc#1195506).
- scsi: scsi_transport_fc: Add store capability to rport port_state in sysfs (bsc#1195506).
- scsi: target: iscsi: Fix cmd abort fabric stop race (bsc#1195286).
- scsi: zfcp: Fix failed recovery on gone remote port with non-NPIV FCP devices (bsc#1195378 LTC#196244).
- scsi_transport_fc: kabi fix blank out FC_PORTSTATE_MARGINAL (bsc#1195506).
- staging/fbtft: Fix backlight (git-fixes).
- staging: fbtft: Fix error path in fbtft_driver_module_init() (git-fixes).
- tracing: Do not inc err_log entry count if entry allocation fails (git-fixes).
- tracing: Dump stacktrace trigger to the corresponding instance (git-fixes).
- tracing: Fix smatch warning for null glob in event_hist_trigger_parse() (git-fixes).
- tracing: Have traceon and traceoff trigger honor the instance (git-fixes).
- tracing: Propagate is_signed to expression (git-fixes).
- usb: dwc2: Fix NULL qh in dwc2_queue_transaction (git-fixes).
- usb: dwc2: gadget: do not try to disable ep0 in dwc2_hsotg_suspend (git-fixes).
- usb: dwc3: do not set gadget->is_otg flag (git-fixes).
- usb: dwc3: gadget: Prevent core from processing stale TRBs (git-fixes).
- usb: f_fs: Fix use-after-free for epfile (git-fixes).
- usb: gadget: f_uac2: Define specific wTerminalType (git-fixes).
- usb: gadget: rndis: check size of RNDIS_MSG_SET command (git-fixes).
- usb: gadget: s3c: remove unused 'udc' variable (git-fixes).
- usb: gadget: udc: renesas_usb3: Fix host to USB_ROLE_NONE transition (git-fixes).
- usb: host: ehci-tegra: Fix error handling in tegra_ehci_probe() (git-fixes).
- usb: ulpi: Call of_node_put correctly (git-fixes).
- usb: ulpi: Move of_node_put to ulpi_dev_release (git-fixes).
Patchnames
SUSE-2022-760,SUSE-SLE-Module-Basesystem-15-SP3-2022-760,SUSE-SLE-Module-Development-Tools-15-SP3-2022-760,SUSE-SLE-Module-Legacy-15-SP3-2022-760,SUSE-SLE-Module-Live-Patching-15-SP3-2022-760,SUSE-SLE-Product-HA-15-SP3-2022-760,SUSE-SLE-Product-WE-15-SP3-2022-760,SUSE-SUSE-MicroOS-5.1-2022-760
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.\n\n\nTransient execution side-channel attacks attacking the Branch History Buffer (BHB),\nnamed \u0027Branch Target Injection\u0027 and \u0027Intra-Mode Branch History Injection\u0027 are now mitigated.\n\nThe following security bugs were fixed:\n\n- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).\n- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).\n- CVE-2022-0847: Fixed a vulnerability were a local attackers could overwrite data in arbitrary (read-only) files (bsc#1196584).\n- CVE-2022-25375: The RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command. Attackers can obtain sensitive information from kernel memory (bnc#1196235 ).\n- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).\n- CVE-2022-0516: Fixed missing check in ioctl related to KVM in s390 allows kernel memory read/write (bsc#1195516).\n\nThe following non-security bugs were fixed:\n\n- ACPI/IORT: Check node revision for PMCG resources (git-fixes).\n- ALSA: hda/realtek: Add missing fixup-model entry for Gigabyte X570 ALC1220 quirks (git-fixes).\n- ALSA: hda/realtek: Add quirk for ASUS GU603 (git-fixes).\n- ALSA: hda/realtek: Fix silent output on Gigabyte X570 Aorus Xtreme after reboot from Windows (git-fixes).\n- ALSA: hda/realtek: Fix silent output on Gigabyte X570S Aorus Master (newer chipset) (git-fixes).\n- ALSA: hda: Fix missing codec probe on Shenker Dock 15 (git-fixes).\n- ALSA: hda: Fix regression on forced probe mask option (git-fixes).\n- ASoC: Revert \u0027ASoC: mediatek: Check for error clk pointer\u0027 (git-fixes).\n- ASoC: ops: Fix stereo change notifications in snd_soc_put_volsw() (git-fixes).\n- ASoC: ops: Fix stereo change notifications in snd_soc_put_volsw_range() (git-fixes).\n- ASoC: ops: Reject out of bounds values in snd_soc_put_volsw() (git-fixes).\n- ASoC: ops: Reject out of bounds values in snd_soc_put_volsw_sx() (git-fixes).\n- ASoC: ops: Reject out of bounds values in snd_soc_put_xr_sx() (git-fixes).\n- Align s390 NVME target options with other architectures (bsc#1188404, jsc#SLE-22494).\n- Drop PCI xgene patch that caused a regression for mxl4 (bsc#1195352)\n- EDAC/xgene: Fix deferred probing (bsc#1178134).\n- HID:Add support for UGTABLET WP5540 (git-fixes).\n- IB/cma: Do not send IGMP leaves for sendonly Multicast groups (git-fixes).\n- IB/hfi1: Fix AIP early init panic (jsc#SLE-13208).\n- KVM: remember position in kvm-\u003evcpus array (bsc#1190972 LTC#194674).\n- NFSD: Fix the behavior of READ near OFFSET_MAX (bsc#1195957).\n- PM: hibernate: Remove register_nosave_region_late() (git-fixes).\n- PM: s2idle: ACPI: Fix wakeup interrupts handling (git-fixes).\n- RDMA/cma: Use correct address when leaving multicast group (bsc#1181147).\n- RDMA/core: Always release restrack object (git-fixes)\n- RDMA/cxgb4: check for ipv6 address properly while destroying listener (git-fixes)\n- RDMA/siw: Release xarray entry (git-fixes)\n- RDMA/ucma: Protect mc during concurrent multicast leaves (bsc#1181147).\n- USB: serial: ch341: add support for GW Instek USB2.0-Serial devices (git-fixes).\n- USB: serial: cp210x: add CPI Bulk Coin Recycler id (git-fixes).\n- USB: serial: cp210x: add NCR Retail IO box id (git-fixes).\n- USB: serial: ftdi_sio: add support for Brainboxes US-159/235/320 (git-fixes).\n- USB: serial: mos7840: remove duplicated 0xac24 device ID (git-fixes).\n- USB: serial: option: add ZTE MF286D modem (git-fixes).\n- ata: libata-core: Disable TRIM on M88V29 (git-fixes).\n- ax25: improve the incomplete fix to avoid UAF and NPD bugs (git-fixes).\n- blk-mq: always allow reserved allocation in hctx_may_queue (bsc#1193787).\n- blk-mq: avoid to iterate over stale request (bsc#1193787).\n- blk-mq: clear stale request in tags-\u003erq before freeing one request pool (bsc#1193787).\n- blk-mq: clearing flush request reference in tags-\u003erqs (bsc#1193787).\n- blk-mq: do not grab rq\u0027s refcount in blk_mq_check_expired() (bsc#1193787 git-fixes).\n- blk-mq: fix is_flush_rq (bsc#1193787 git-fixes).\n- blk-mq: fix kernel panic during iterating over flush request (bsc#1193787 git-fixes).\n- blk-mq: grab rq-\u003erefcount before calling -\u003efn in blk_mq_tagset_busy_iter (bsc#1193787).\n- blk-mq: mark flush request as IDLE in flush_end_io() (bsc#1193787).\n- blk-tag: Hide spin_lock (bsc#1193787).\n- block: avoid double io accounting for flush request (bsc#1193787).\n- block: do not send a rezise udev event for hidden block device (bsc#1193096).\n- block: mark flush request as IDLE when it is really finished (bsc#1193787).\n- bonding: pair enable_port with slave_arr_updates (git-fixes).\n- bpf: Adjust BTF log size limit (git-fixes).\n- bpf: Disallow BPF_LOG_KERNEL log level for bpf(BPF_BTF_LOAD) (git-fixes).\n- btrfs: check for missing device in btrfs_trim_fs (bsc#1195701).\n- btrfs: check worker before need_preemptive_reclaim (bsc#1196195).\n- btrfs: do not do preemptive flushing if the majority is global rsv (bsc#1196195).\n- btrfs: do not include the global rsv size in the preemptive used amount (bsc#1196195).\n- btrfs: handle preemptive delalloc flushing slightly differently (bsc#1196195).\n- btrfs: make sure SB_I_VERSION does not get unset by remount (bsc#1192210).\n- btrfs: only clamp the first time we have to start flushing (bsc#1196195).\n- btrfs: only ignore delalloc if delalloc is much smaller than ordered (bsc#1196195).\n- btrfs: reduce the preemptive flushing threshold to 90% (bsc#1196195).\n- btrfs: take into account global rsv in need_preemptive_reclaim (bsc#1196195).\n- btrfs: use the global rsv size in the preemptive thresh calculation (bsc#1196195).\n- ceph: properly put ceph_string reference after async create attempt (bsc#1195798).\n- ceph: set pool_ns in new inode layout for async creates (bsc#1195799).\n- drm/amdgpu: fix logic inversion in check (git-fixes).\n- drm/i915/gvt: Make DRM_I915_GVT depend on X86 (git-fixes).\n- drm/i915/gvt: clean up kernel-doc in gtt.c (git-fixes).\n- drm/i915/opregion: check port number bounds for SWSCI display power state (git-fixes).\n- drm/i915: Correctly populate use_sagv_wm for all pipes (git-fixes).\n- drm/i915: Fix bw atomic check when switching between SAGV vs. no SAGV (git-fixes).\n- drm/panel: simple: Assign data from panel_dpi_probe() correctly (git-fixes).\n- drm/radeon: Fix backlight control on iMac 12,1 (git-fixes).\n- drm/rockchip: dw_hdmi: Do not leave clock enabled in error case (git-fixes).\n- drm/rockchip: vop: Correct RK3399 VOP register fields (git-fixes).\n- drm/vc4: hdmi: Allow DBLCLK modes even if horz timing is odd (git-fixes).\n- drm: panel-orientation-quirks: Add quirk for the 1Netbook OneXPlayer (git-fixes).\n- ext4: check for inconsistent extents between index and leaf block (bsc#1194163 bsc#1196339).\n- ext4: check for out-of-order index extents in ext4_valid_extent_entries() (bsc#1194163 bsc#1196339).\n- ext4: prevent partial update of the extent blocks (bsc#1194163 bsc#1196339).\n- gve: Add RX context (bsc#1191655).\n- gve: Add a jumbo-frame device option (bsc#1191655).\n- gve: Add consumed counts to ethtool stats (bsc#1191655).\n- gve: Add optional metadata descriptor type GVE_TXD_MTD (bsc#1191655).\n- gve: Correct order of processing device options (bsc#1191655).\n- gve: Fix GFP flags when allocing pages (git-fixes).\n- gve: Fix off by one in gve_tx_timeout() (bsc#1191655).\n- gve: Implement packet continuation for RX (bsc#1191655).\n- gve: Implement suspend/resume/shutdown (bsc#1191655).\n- gve: Move the irq db indexes out of the ntfy block struct (bsc#1191655).\n- gve: Recording rx queue before sending to napi (bsc#1191655).\n- gve: Recover from queue stall due to missed IRQ (bsc#1191655).\n- gve: Update gve_free_queue_page_list signature (bsc#1191655).\n- gve: Use kvcalloc() instead of kvzalloc() (bsc#1191655).\n- gve: fix for null pointer dereference (bsc#1191655).\n- gve: fix the wrong AdminQ buffer queue index check (bsc#1176940).\n- gve: fix unmatched u64_stats_update_end() (bsc#1191655).\n- gve: remove memory barrier around seqno (bsc#1191655).\n- i2c: brcmstb: fix support for DSL and CM variants (git-fixes).\n- i40e: Fix for failed to init adminq while VF reset (git-fixes).\n- i40e: Fix issue when maximum queues is exceeded (git-fixes).\n- i40e: Fix queues reservation for XDP (git-fixes).\n- i40e: Increase delay to 1 s after global EMP reset (git-fixes).\n- i40e: fix unsigned stat widths (git-fixes).\n- ibmvnic: Allow queueing resets during probe (bsc#1196516 ltc#196391).\n- ibmvnic: clear fop when retrying probe (bsc#1196516 ltc#196391).\n- ibmvnic: complete init_done on transport events (bsc#1196516 ltc#196391).\n- ibmvnic: define flush_reset_queue helper (bsc#1196516 ltc#196391).\n- ibmvnic: do not release napi in __ibmvnic_open() (bsc#1195668 ltc#195811).\n- ibmvnic: free reset-work-item when flushing (bsc#1196516 ltc#196391).\n- ibmvnic: init init_done_rc earlier (bsc#1196516 ltc#196391).\n- ibmvnic: initialize rc before completing wait (bsc#1196516 ltc#196391).\n- ibmvnic: register netdev after init of adapter (bsc#1196516 ltc#196391).\n- ibmvnic: schedule failover only if vioctl fails (bsc#1196400 ltc#195815).\n- ice: fix IPIP and SIT TSO offload (git-fixes).\n- ice: fix an error code in ice_cfg_phy_fec() (jsc#SLE-12878).\n- ima: Allow template selection with ima_template[_fmt]= after ima_hash= (git-fixes).\n- ima: Do not print policy rule with inactive LSM labels (git-fixes).\n- ima: Remove ima_policy file before directory (git-fixes).\n- integrity: Make function integrity_add_key() static (git-fixes).\n- integrity: check the return value of audit_log_start() (git-fixes).\n- integrity: double check iint_cache was initialized (git-fixes).\n- iommu/amd: Fix loop timeout issue in iommu_ga_log_enable() (git-fixes).\n- iommu/amd: Remove useless irq affinity notifier (git-fixes).\n- iommu/amd: Restore GA log/tail pointer on host resume (git-fixes).\n- iommu/amd: X2apic mode: mask/unmask interrupts on suspend/resume (git-fixes).\n- iommu/amd: X2apic mode: re-enable after resume (git-fixes).\n- iommu/amd: X2apic mode: setup the INTX registers on mask/unmask (git-fixes).\n- iommu/io-pgtable-arm-v7s: Add error handle for page table allocation failure (git-fixes).\n- iommu/io-pgtable-arm: Fix table descriptor paddr formatting (git-fixes).\n- iommu/iova: Fix race between FQ timeout and teardown (git-fixes).\n- iommu/vt-d: Fix potential memory leak in intel_setup_irq_remapping() (git-fixes).\n- iwlwifi: fix use-after-free (git-fixes).\n- iwlwifi: pcie: fix locking when \u0027HW not ready\u0027 (git-fixes).\n- iwlwifi: pcie: gen2: fix locking when \u0027HW not ready\u0027 (git-fixes).\n- ixgbevf: Require large buffers for build_skb on 82599VF (git-fixes).\n- kABI fixup after adding vcpu_idx to struct kvm_cpu (bsc#1190972 LTC#194674).\n- kABI: Fix kABI for AMD IOMMU driver (git-fixes).\n- kabi: Hide changes to s390/AP structures (jsc#SLE-20807).\n- lib/iov_iter: initialize \u0027flags\u0027 in new pipe_buffer (bsc#1196584).\n- libsubcmd: Fix use-after-free for realloc(..., 0) (git-fixes).\n- md/raid5: fix oops during stripe resizing (bsc#1181588).\n- misc: fastrpc: avoid double fput() on failed usercopy (git-fixes).\n- mmc: sdhci-of-esdhc: Check for error num after setting mask (git-fixes).\n- mtd: rawnand: brcmnand: Fixed incorrect sub-page ECC status (git-fixes).\n- mtd: rawnand: gpmi: do not leak PM reference in error path (git-fixes).\n- mtd: rawnand: qcom: Fix clock sequencing in qcom_nandc_probe() (git-fixes).\n- net/ibmvnic: Cleanup workaround doing an EOI after partition migration (bsc#1089644 ltc#166495 ltc#165544 git-fixes).\n- net/mlx5e: Fix handling of wrong devices during bond netevent (jsc#SLE-15172).\n- net: macb: Align the dma and coherent dma masks (git-fixes).\n- net: mdio: aspeed: Add missing MODULE_DEVICE_TABLE (bsc#1176447).\n- net: phy: marvell: Fix MDI-x polarity setting in 88e1118-compatible PHYs (git-fixes).\n- net: phy: marvell: Fix RGMII Tx/Rx delays setting in 88e1121-compatible PHYs (git-fixes).\n- net: phy: marvell: configure RGMII delays for 88E1118 (git-fixes).\n- net: usb: qmi_wwan: Add support for Dell DW5829e (git-fixes).\n- nfp: flower: fix ida_idx not being released (bsc#1154353).\n- nfsd: allow delegation state ids to be revoked and then freed (bsc#1192483).\n- nfsd: allow lock state ids to be revoked and then freed (bsc#1192483).\n- nfsd: allow open state ids to be revoked and then freed (bsc#1192483).\n- nfsd: do not admin-revoke NSv4.0 state ids (bsc#1192483).\n- nfsd: prepare for supporting admin-revocation of state (bsc#1192483).\n- nvme-fabrics: fix state check in nvmf_ctlr_matches_baseopts() (bsc#1195012).\n- nvme: also mark passthrough-only namespaces ready in nvme_update_ns_info (git-fixes).\n- nvme: do not return an error from nvme_configure_metadata (git-fixes).\n- nvme: let namespace probing continue for unsupported features (git-fixes).\n- powerpc/64: Move paca allocation later in boot (bsc#1190812).\n- powerpc/64s: Fix debugfs_simple_attr.cocci warnings (bsc#1157038 bsc#1157923 ltc#182612 git-fixes).\n- powerpc/pseries/ddw: Revert \u0027Extend upper limit for huge DMA window for persistent memory\u0027 (bsc#1195995 ltc#196394).\n- powerpc/pseries: read the lpar name from the firmware (bsc#1187716 ltc#193451).\n- powerpc: Set crashkernel offset to mid of RMA region (bsc#1190812).\n- powerpc: add link stack flush mitigation status in debugfs (bsc#1157038 bsc#1157923 ltc#182612 git-fixes).\n- s390/AP: support new dynamic AP bus size limit (jsc#SLE-20807).\n- s390/bpf: Fix 64-bit subtraction of the -0x80000000 constant (git-fixes).\n- s390/bpf: Fix optimizing out zero-extensions (git-fixes).\n- s390/cio: make ccw_device_dma_* more robust (bsc#1193243 LTC#195549).\n- s390/cio: verify the driver availability for path_event call (bsc#1195928 LTC#196418).\n- s390/cpumf: Support for CPU Measurement Facility CSVN 7 (bsc#1195081 LTC#196088).\n- s390/cpumf: Support for CPU Measurement Sampling Facility LS bit (bsc#1195081 LTC#196088).\n- s390/pci: add s390_iommu_aperture kernel parameter (bsc#1193233 LTC#195540).\n- s390/pci: move pseudo-MMIO to prevent MIO overlap (bsc#1194967 LTC#196028).\n- s390/protvirt: fix error return code in uv_info_init() (jsc#SLE-22135).\n- s390/sclp: fix Secure-IPL facility detection (bsc#1191741 LTC#194816).\n- s390/uv: add prot virt guest/host indication files (jsc#SLE-22135).\n- s390/uv: fix prot virt host indication compilation (jsc#SLE-22135).\n- scsi: core: Add a new error code DID_TRANSPORT_MARGINAL in scsi.h (bsc#1195506).\n- scsi: core: Add limitless cmd retry support (bsc#1195506).\n- scsi: core: No retries on abort success (bsc#1195506).\n- scsi: kABI fix for \u0027eh_should_retry_cmd\u0027 (bsc#1195506).\n- scsi: lpfc: Add support for eh_should_retry_cmd() (bsc#1195506).\n- scsi: lpfc: Fix pt2pt NVMe PRLI reject LOGO loop (bsc#1189126).\n- scsi: qla2xxx: Add devids and conditionals for 28xx (bsc#1195823).\n- scsi: qla2xxx: Add marginal path handling support (bsc#1195506).\n- scsi: qla2xxx: Add ql2xnvme_queues module param to configure number of NVMe queues (bsc#1195823).\n- scsi: qla2xxx: Add qla2x00_async_done() for async routines (bsc#1195823).\n- scsi: qla2xxx: Add retry for exec firmware (bsc#1195823).\n- scsi: qla2xxx: Check for firmware dump already collected (bsc#1195823).\n- scsi: qla2xxx: Fix T10 PI tag escape and IP guard options for 28XX adapters (bsc#1195823).\n- scsi: qla2xxx: Fix device reconnect in loop topology (bsc#1195823).\n- scsi: qla2xxx: Fix premature hw access after PCI error (bsc#1195823).\n- scsi: qla2xxx: Fix scheduling while atomic (bsc#1195823).\n- scsi: qla2xxx: Fix stuck session in gpdb (bsc#1195823).\n- scsi: qla2xxx: Fix unmap of already freed sgl (bsc#1195823).\n- scsi: qla2xxx: Fix warning for missing error code (bsc#1195823).\n- scsi: qla2xxx: Fix warning message due to adisc being flushed (bsc#1195823).\n- scsi: qla2xxx: Fix wrong FDMI data for 64G adapter (bsc#1195823).\n- scsi: qla2xxx: Implement ref count for SRB (bsc#1195823).\n- scsi: qla2xxx: Refactor asynchronous command initialization (bsc#1195823).\n- scsi: qla2xxx: Remove a declaration (bsc#1195823).\n- scsi: qla2xxx: Remove unused qla_sess_op_cmd_list from scsi_qla_host_t (bsc#1195823).\n- scsi: qla2xxx: Return -ENOMEM if kzalloc() fails (bsc#1195823).\n- scsi: qla2xxx: Suppress a kernel complaint in qla_create_qpair() (bsc#1195823).\n- scsi: qla2xxx: Update version to 10.02.07.200-k (bsc#1195823).\n- scsi: qla2xxx: Update version to 10.02.07.300-k (bsc#1195823).\n- scsi: qla2xxx: edif: Fix clang warning (bsc#1195823).\n- scsi: qla2xxx: edif: Fix inconsistent check of db_flags (bsc#1195823).\n- scsi: qla2xxx: edif: Reduce connection thrash (bsc#1195823).\n- scsi: qla2xxx: edif: Replace list_for_each_safe with list_for_each_entry_safe (bsc#1195823).\n- scsi: qla2xxx: edif: Tweak trace message (bsc#1195823).\n- scsi: scsi_transport_fc: Add a new rport state FC_PORTSTATE_MARGINAL (bsc#1195506).\n- scsi: scsi_transport_fc: Add store capability to rport port_state in sysfs (bsc#1195506).\n- scsi: target: iscsi: Fix cmd abort fabric stop race (bsc#1195286).\n- scsi: zfcp: Fix failed recovery on gone remote port with non-NPIV FCP devices (bsc#1195378 LTC#196244).\n- scsi_transport_fc: kabi fix blank out FC_PORTSTATE_MARGINAL (bsc#1195506).\n- staging/fbtft: Fix backlight (git-fixes).\n- staging: fbtft: Fix error path in fbtft_driver_module_init() (git-fixes).\n- tracing: Do not inc err_log entry count if entry allocation fails (git-fixes).\n- tracing: Dump stacktrace trigger to the corresponding instance (git-fixes).\n- tracing: Fix smatch warning for null glob in event_hist_trigger_parse() (git-fixes).\n- tracing: Have traceon and traceoff trigger honor the instance (git-fixes).\n- tracing: Propagate is_signed to expression (git-fixes).\n- usb: dwc2: Fix NULL qh in dwc2_queue_transaction (git-fixes).\n- usb: dwc2: gadget: do not try to disable ep0 in dwc2_hsotg_suspend (git-fixes).\n- usb: dwc3: do not set gadget-\u003eis_otg flag (git-fixes).\n- usb: dwc3: gadget: Prevent core from processing stale TRBs (git-fixes).\n- usb: f_fs: Fix use-after-free for epfile (git-fixes).\n- usb: gadget: f_uac2: Define specific wTerminalType (git-fixes).\n- usb: gadget: rndis: check size of RNDIS_MSG_SET command (git-fixes).\n- usb: gadget: s3c: remove unused \u0027udc\u0027 variable (git-fixes).\n- usb: gadget: udc: renesas_usb3: Fix host to USB_ROLE_NONE transition (git-fixes).\n- usb: host: ehci-tegra: Fix error handling in tegra_ehci_probe() (git-fixes).\n- usb: ulpi: Call of_node_put correctly (git-fixes).\n- usb: ulpi: Move of_node_put to ulpi_dev_release (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-760,SUSE-SLE-Module-Basesystem-15-SP3-2022-760,SUSE-SLE-Module-Development-Tools-15-SP3-2022-760,SUSE-SLE-Module-Legacy-15-SP3-2022-760,SUSE-SLE-Module-Live-Patching-15-SP3-2022-760,SUSE-SLE-Product-HA-15-SP3-2022-760,SUSE-SLE-Product-WE-15-SP3-2022-760,SUSE-SUSE-MicroOS-5.1-2022-760", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0760-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:0760-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220760-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:0760-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010397.html" }, { "category": "self", "summary": "SUSE Bug 1089644", "url": "https://bugzilla.suse.com/1089644" }, { "category": "self", "summary": "SUSE Bug 1154353", "url": "https://bugzilla.suse.com/1154353" }, { "category": "self", "summary": "SUSE Bug 1157038", "url": "https://bugzilla.suse.com/1157038" }, { "category": "self", "summary": "SUSE Bug 1157923", "url": "https://bugzilla.suse.com/1157923" }, { "category": "self", "summary": "SUSE Bug 1176447", "url": "https://bugzilla.suse.com/1176447" }, { "category": "self", "summary": "SUSE Bug 1176940", "url": "https://bugzilla.suse.com/1176940" }, { "category": "self", "summary": "SUSE Bug 1178134", "url": "https://bugzilla.suse.com/1178134" }, { "category": "self", "summary": "SUSE Bug 1181147", "url": "https://bugzilla.suse.com/1181147" }, { "category": "self", "summary": "SUSE Bug 1181588", "url": "https://bugzilla.suse.com/1181588" }, { "category": "self", "summary": "SUSE Bug 1183872", "url": "https://bugzilla.suse.com/1183872" }, { "category": "self", "summary": "SUSE Bug 1187716", "url": "https://bugzilla.suse.com/1187716" }, { "category": "self", "summary": "SUSE Bug 1188404", "url": "https://bugzilla.suse.com/1188404" }, { "category": "self", "summary": "SUSE Bug 1189126", "url": "https://bugzilla.suse.com/1189126" }, { "category": "self", "summary": "SUSE Bug 1190812", "url": "https://bugzilla.suse.com/1190812" }, { "category": "self", "summary": "SUSE Bug 1190972", "url": "https://bugzilla.suse.com/1190972" }, { "category": "self", "summary": "SUSE Bug 1191580", "url": "https://bugzilla.suse.com/1191580" }, { "category": "self", "summary": "SUSE Bug 1191655", "url": "https://bugzilla.suse.com/1191655" }, { "category": "self", "summary": "SUSE Bug 1191741", "url": "https://bugzilla.suse.com/1191741" }, { "category": "self", "summary": "SUSE Bug 1192210", "url": "https://bugzilla.suse.com/1192210" }, { "category": "self", "summary": "SUSE Bug 1192483", "url": "https://bugzilla.suse.com/1192483" }, { "category": "self", "summary": "SUSE Bug 1193096", "url": "https://bugzilla.suse.com/1193096" }, { "category": "self", "summary": "SUSE Bug 1193233", "url": "https://bugzilla.suse.com/1193233" }, { "category": "self", "summary": "SUSE Bug 1193243", "url": "https://bugzilla.suse.com/1193243" }, { "category": "self", "summary": "SUSE Bug 1193787", "url": "https://bugzilla.suse.com/1193787" }, { "category": "self", "summary": "SUSE Bug 1194163", "url": "https://bugzilla.suse.com/1194163" }, { "category": "self", "summary": "SUSE Bug 1194967", "url": "https://bugzilla.suse.com/1194967" }, { "category": "self", "summary": "SUSE Bug 1195012", "url": "https://bugzilla.suse.com/1195012" }, { "category": "self", "summary": "SUSE Bug 1195081", "url": "https://bugzilla.suse.com/1195081" }, { "category": "self", "summary": "SUSE Bug 1195286", "url": "https://bugzilla.suse.com/1195286" }, { "category": "self", "summary": "SUSE Bug 1195352", "url": "https://bugzilla.suse.com/1195352" }, { "category": "self", "summary": "SUSE Bug 1195378", "url": "https://bugzilla.suse.com/1195378" }, { "category": "self", "summary": "SUSE Bug 1195506", "url": "https://bugzilla.suse.com/1195506" }, { "category": "self", "summary": "SUSE Bug 1195516", "url": "https://bugzilla.suse.com/1195516" }, { "category": "self", "summary": "SUSE Bug 1195543", "url": "https://bugzilla.suse.com/1195543" }, { "category": "self", "summary": "SUSE Bug 1195668", "url": "https://bugzilla.suse.com/1195668" }, { "category": "self", "summary": "SUSE Bug 1195701", "url": "https://bugzilla.suse.com/1195701" }, { "category": "self", "summary": "SUSE Bug 1195798", "url": "https://bugzilla.suse.com/1195798" }, { "category": "self", "summary": "SUSE Bug 1195799", "url": "https://bugzilla.suse.com/1195799" }, { "category": "self", "summary": "SUSE Bug 1195823", "url": "https://bugzilla.suse.com/1195823" }, { "category": "self", "summary": "SUSE Bug 1195908", "url": "https://bugzilla.suse.com/1195908" }, { "category": "self", "summary": "SUSE Bug 1195928", "url": "https://bugzilla.suse.com/1195928" }, { "category": "self", "summary": "SUSE Bug 1195947", "url": "https://bugzilla.suse.com/1195947" }, { "category": "self", "summary": "SUSE Bug 1195957", "url": "https://bugzilla.suse.com/1195957" }, { "category": "self", "summary": "SUSE Bug 1195995", "url": "https://bugzilla.suse.com/1195995" }, { "category": "self", "summary": "SUSE Bug 1196195", "url": "https://bugzilla.suse.com/1196195" }, { "category": "self", "summary": "SUSE Bug 1196235", "url": "https://bugzilla.suse.com/1196235" }, { "category": "self", "summary": "SUSE Bug 1196339", "url": "https://bugzilla.suse.com/1196339" }, { "category": "self", "summary": "SUSE Bug 1196373", "url": "https://bugzilla.suse.com/1196373" }, { "category": "self", "summary": "SUSE Bug 1196400", "url": "https://bugzilla.suse.com/1196400" }, { "category": "self", "summary": "SUSE Bug 1196403", "url": "https://bugzilla.suse.com/1196403" }, { "category": "self", "summary": "SUSE Bug 1196516", "url": "https://bugzilla.suse.com/1196516" }, { "category": "self", "summary": "SUSE Bug 1196584", "url": "https://bugzilla.suse.com/1196584" }, { "category": "self", "summary": "SUSE Bug 1196585", "url": "https://bugzilla.suse.com/1196585" }, { "category": "self", "summary": "SUSE Bug 1196601", "url": "https://bugzilla.suse.com/1196601" }, { "category": "self", "summary": "SUSE Bug 1196612", "url": "https://bugzilla.suse.com/1196612" }, { "category": "self", "summary": "SUSE Bug 1196776", "url": "https://bugzilla.suse.com/1196776" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0001 page", "url": "https://www.suse.com/security/cve/CVE-2022-0001/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0002 page", "url": "https://www.suse.com/security/cve/CVE-2022-0002/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0492 page", "url": "https://www.suse.com/security/cve/CVE-2022-0492/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0516 page", "url": "https://www.suse.com/security/cve/CVE-2022-0516/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0847 page", "url": "https://www.suse.com/security/cve/CVE-2022-0847/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-25375 page", "url": "https://www.suse.com/security/cve/CVE-2022-25375/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2022-03-08T18:07:32Z", "generator": { "date": "2022-03-08T18:07:32Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:0760-1", "initial_release_date": "2022-03-08T18:07:32Z", "revision_history": [ { "date": "2022-03-08T18:07:32Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "product": { "name": "cluster-md-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "product_id": "cluster-md-kmp-64kb-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64", "product": { "name": "cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64", "product_id": "cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "cluster-md-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "product": { "name": "cluster-md-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "product_id": "cluster-md-kmp-preempt-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dlm-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "product_id": "dlm-kmp-64kb-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dlm-kmp-default-5.3.18-150300.59.54.1.aarch64", "product_id": "dlm-kmp-default-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dlm-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "product_id": "dlm-kmp-preempt-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-al-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-al-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-al-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-allwinner-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-allwinner-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-allwinner-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-altera-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-altera-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-altera-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-amd-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-amd-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-amd-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-amlogic-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-amlogic-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-amlogic-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-apm-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-apm-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-apm-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-arm-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-arm-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-arm-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-broadcom-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-broadcom-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-broadcom-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-cavium-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-cavium-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-cavium-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-exynos-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-exynos-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-exynos-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-freescale-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-freescale-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-freescale-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-hisilicon-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-hisilicon-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-hisilicon-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-lg-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-lg-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-lg-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-marvell-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-marvell-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-marvell-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-mediatek-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-mediatek-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-mediatek-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-nvidia-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-nvidia-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-nvidia-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-qcom-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-qcom-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-qcom-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-renesas-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-renesas-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-renesas-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-rockchip-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-rockchip-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-rockchip-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-socionext-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-socionext-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-socionext-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-sprd-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-sprd-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-sprd-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-xilinx-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-xilinx-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-xilinx-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "dtb-zte-5.3.18-150300.59.54.1.aarch64", "product": { "name": "dtb-zte-5.3.18-150300.59.54.1.aarch64", "product_id": "dtb-zte-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "product": { "name": "gfs2-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "product_id": "gfs2-kmp-64kb-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "product": { "name": "gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "product_id": "gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "product": { "name": "gfs2-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "product_id": "gfs2-kmp-preempt-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-64kb-5.3.18-150300.59.54.1.aarch64", "product": { "name": "kernel-64kb-5.3.18-150300.59.54.1.aarch64", "product_id": "kernel-64kb-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64", "product": { "name": "kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64", "product_id": "kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-64kb-extra-5.3.18-150300.59.54.1.aarch64", "product": { "name": "kernel-64kb-extra-5.3.18-150300.59.54.1.aarch64", "product_id": "kernel-64kb-extra-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-64kb-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "product": { "name": "kernel-64kb-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "product_id": "kernel-64kb-livepatch-devel-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-64kb-optional-5.3.18-150300.59.54.1.aarch64", "product": { "name": "kernel-64kb-optional-5.3.18-150300.59.54.1.aarch64", "product_id": "kernel-64kb-optional-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-5.3.18-150300.59.54.1.aarch64", "product": { "name": "kernel-default-5.3.18-150300.59.54.1.aarch64", "product_id": "kernel-default-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "product": { "name": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "product_id": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "product": { "name": "kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "product_id": "kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-5.3.18-150300.59.54.1.aarch64", "product": { "name": "kernel-default-devel-5.3.18-150300.59.54.1.aarch64", "product_id": "kernel-default-devel-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-5.3.18-150300.59.54.1.aarch64", "product": { "name": "kernel-default-extra-5.3.18-150300.59.54.1.aarch64", "product_id": "kernel-default-extra-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.3.18-150300.59.54.1.aarch64", "product": { "name": "kernel-default-livepatch-5.3.18-150300.59.54.1.aarch64", "product_id": "kernel-default-livepatch-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "product": { "name": "kernel-default-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "product_id": "kernel-default-livepatch-devel-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-optional-5.3.18-150300.59.54.1.aarch64", "product": { "name": "kernel-default-optional-5.3.18-150300.59.54.1.aarch64", "product_id": "kernel-default-optional-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-5.3.18-150300.59.54.1.aarch64", "product": { "name": "kernel-obs-build-5.3.18-150300.59.54.1.aarch64", "product_id": "kernel-obs-build-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-5.3.18-150300.59.54.1.aarch64", "product": { "name": "kernel-obs-qa-5.3.18-150300.59.54.1.aarch64", "product_id": "kernel-obs-qa-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-preempt-5.3.18-150300.59.54.1.aarch64", "product": { "name": "kernel-preempt-5.3.18-150300.59.54.1.aarch64", "product_id": "kernel-preempt-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64", "product": { "name": "kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64", "product_id": "kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-preempt-extra-5.3.18-150300.59.54.1.aarch64", "product": { "name": "kernel-preempt-extra-5.3.18-150300.59.54.1.aarch64", "product_id": "kernel-preempt-extra-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-preempt-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "product": { "name": "kernel-preempt-livepatch-devel-5.3.18-150300.59.54.1.aarch64", "product_id": "kernel-preempt-livepatch-devel-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-preempt-optional-5.3.18-150300.59.54.1.aarch64", "product": { "name": "kernel-preempt-optional-5.3.18-150300.59.54.1.aarch64", "product_id": "kernel-preempt-optional-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-5.3.18-150300.59.54.1.aarch64", "product": { "name": "kernel-syms-5.3.18-150300.59.54.1.aarch64", "product_id": "kernel-syms-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "product": { "name": "kselftests-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "product_id": "kselftests-kmp-64kb-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.3.18-150300.59.54.1.aarch64", "product": { "name": "kselftests-kmp-default-5.3.18-150300.59.54.1.aarch64", "product_id": "kselftests-kmp-default-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "product": { "name": "kselftests-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "product_id": "kselftests-kmp-preempt-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "product": { "name": "ocfs2-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "product_id": "ocfs2-kmp-64kb-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "product": { "name": "ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "product_id": "ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "product": { "name": "ocfs2-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "product_id": "ocfs2-kmp-preempt-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "product": { "name": "reiserfs-kmp-64kb-5.3.18-150300.59.54.1.aarch64", "product_id": "reiserfs-kmp-64kb-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64", "product": { "name": "reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64", "product_id": "reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "product": { "name": "reiserfs-kmp-preempt-5.3.18-150300.59.54.1.aarch64", "product_id": "reiserfs-kmp-preempt-5.3.18-150300.59.54.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-5.3.18-150300.59.54.1.noarch", "product": { "name": "kernel-devel-5.3.18-150300.59.54.1.noarch", "product_id": "kernel-devel-5.3.18-150300.59.54.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-5.3.18-150300.59.54.1.noarch", "product": { "name": "kernel-docs-5.3.18-150300.59.54.1.noarch", "product_id": "kernel-docs-5.3.18-150300.59.54.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-5.3.18-150300.59.54.1.noarch", "product": { "name": "kernel-docs-html-5.3.18-150300.59.54.1.noarch", "product_id": "kernel-docs-html-5.3.18-150300.59.54.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-5.3.18-150300.59.54.1.noarch", "product": { "name": "kernel-macros-5.3.18-150300.59.54.1.noarch", "product_id": "kernel-macros-5.3.18-150300.59.54.1.noarch" } }, { "category": "product_version", "name": "kernel-source-5.3.18-150300.59.54.1.noarch", "product": { "name": "kernel-source-5.3.18-150300.59.54.1.noarch", "product_id": "kernel-source-5.3.18-150300.59.54.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-5.3.18-150300.59.54.1.noarch", "product": { "name": "kernel-source-vanilla-5.3.18-150300.59.54.1.noarch", "product_id": "kernel-source-vanilla-5.3.18-150300.59.54.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le", "product": { "name": "cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le", "product_id": "cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le", "product": { "name": "dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le", "product_id": "dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "product": { "name": "gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "product_id": "gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-5.3.18-150300.59.54.1.ppc64le", "product": { "name": "kernel-debug-5.3.18-150300.59.54.1.ppc64le", "product_id": "kernel-debug-5.3.18-150300.59.54.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-5.3.18-150300.59.54.1.ppc64le", "product": { "name": "kernel-debug-devel-5.3.18-150300.59.54.1.ppc64le", "product_id": "kernel-debug-devel-5.3.18-150300.59.54.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "product": { "name": "kernel-debug-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "product_id": "kernel-debug-livepatch-devel-5.3.18-150300.59.54.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-5.3.18-150300.59.54.1.ppc64le", "product": { "name": "kernel-default-5.3.18-150300.59.54.1.ppc64le", "product_id": "kernel-default-5.3.18-150300.59.54.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "product": { "name": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "product_id": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "product": { "name": "kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "product_id": "kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-5.3.18-150300.59.54.1.ppc64le", "product": { "name": "kernel-default-devel-5.3.18-150300.59.54.1.ppc64le", "product_id": "kernel-default-devel-5.3.18-150300.59.54.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-5.3.18-150300.59.54.1.ppc64le", "product": { "name": "kernel-default-extra-5.3.18-150300.59.54.1.ppc64le", "product_id": "kernel-default-extra-5.3.18-150300.59.54.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le", "product": { "name": "kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le", "product_id": "kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "product": { "name": "kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "product_id": "kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-optional-5.3.18-150300.59.54.1.ppc64le", "product": { "name": "kernel-default-optional-5.3.18-150300.59.54.1.ppc64le", "product_id": "kernel-default-optional-5.3.18-150300.59.54.1.ppc64le" } }, { "category": "product_version", "name": "kernel-kvmsmall-5.3.18-150300.59.54.1.ppc64le", "product": { "name": "kernel-kvmsmall-5.3.18-150300.59.54.1.ppc64le", "product_id": "kernel-kvmsmall-5.3.18-150300.59.54.1.ppc64le" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-5.3.18-150300.59.54.1.ppc64le", "product": { "name": "kernel-kvmsmall-devel-5.3.18-150300.59.54.1.ppc64le", "product_id": "kernel-kvmsmall-devel-5.3.18-150300.59.54.1.ppc64le" } }, { "category": "product_version", "name": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "product": { "name": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.54.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.ppc64le", "product_id": "kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-5.3.18-150300.59.54.1.ppc64le", "product": { "name": "kernel-obs-build-5.3.18-150300.59.54.1.ppc64le", "product_id": "kernel-obs-build-5.3.18-150300.59.54.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-5.3.18-150300.59.54.1.ppc64le", "product": { "name": "kernel-obs-qa-5.3.18-150300.59.54.1.ppc64le", "product_id": "kernel-obs-qa-5.3.18-150300.59.54.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-5.3.18-150300.59.54.1.ppc64le", "product": { "name": "kernel-syms-5.3.18-150300.59.54.1.ppc64le", "product_id": "kernel-syms-5.3.18-150300.59.54.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.3.18-150300.59.54.1.ppc64le", "product": { "name": "kselftests-kmp-default-5.3.18-150300.59.54.1.ppc64le", "product_id": "kselftests-kmp-default-5.3.18-150300.59.54.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "product": { "name": "ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "product_id": "ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le", "product": { "name": "reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le", "product_id": "reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x", "product": { "name": "cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x", "product_id": "cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-5.3.18-150300.59.54.1.s390x", "product": { "name": "dlm-kmp-default-5.3.18-150300.59.54.1.s390x", "product_id": "dlm-kmp-default-5.3.18-150300.59.54.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "product": { "name": "gfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "product_id": "gfs2-kmp-default-5.3.18-150300.59.54.1.s390x" } }, { "category": "product_version", "name": "kernel-default-5.3.18-150300.59.54.1.s390x", "product": { "name": "kernel-default-5.3.18-150300.59.54.1.s390x", "product_id": "kernel-default-5.3.18-150300.59.54.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "product": { "name": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "product_id": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "product": { "name": "kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "product_id": "kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-5.3.18-150300.59.54.1.s390x", "product": { "name": "kernel-default-devel-5.3.18-150300.59.54.1.s390x", "product_id": "kernel-default-devel-5.3.18-150300.59.54.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-5.3.18-150300.59.54.1.s390x", "product": { "name": "kernel-default-extra-5.3.18-150300.59.54.1.s390x", "product_id": "kernel-default-extra-5.3.18-150300.59.54.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.3.18-150300.59.54.1.s390x", "product": { "name": "kernel-default-livepatch-5.3.18-150300.59.54.1.s390x", "product_id": "kernel-default-livepatch-5.3.18-150300.59.54.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x", "product": { "name": "kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x", "product_id": "kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x" } }, { "category": "product_version", "name": "kernel-default-optional-5.3.18-150300.59.54.1.s390x", "product": { "name": "kernel-default-optional-5.3.18-150300.59.54.1.s390x", "product_id": "kernel-default-optional-5.3.18-150300.59.54.1.s390x" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.s390x", "product": { "name": "kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.s390x", "product_id": "kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-5.3.18-150300.59.54.1.s390x", "product": { "name": "kernel-obs-build-5.3.18-150300.59.54.1.s390x", "product_id": "kernel-obs-build-5.3.18-150300.59.54.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-5.3.18-150300.59.54.1.s390x", "product": { "name": "kernel-obs-qa-5.3.18-150300.59.54.1.s390x", "product_id": "kernel-obs-qa-5.3.18-150300.59.54.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-5.3.18-150300.59.54.1.s390x", "product": { "name": "kernel-syms-5.3.18-150300.59.54.1.s390x", "product_id": "kernel-syms-5.3.18-150300.59.54.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-5.3.18-150300.59.54.1.s390x", "product": { "name": "kernel-zfcpdump-5.3.18-150300.59.54.1.s390x", "product_id": "kernel-zfcpdump-5.3.18-150300.59.54.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.3.18-150300.59.54.1.s390x", "product": { "name": "kselftests-kmp-default-5.3.18-150300.59.54.1.s390x", "product_id": "kselftests-kmp-default-5.3.18-150300.59.54.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "product": { "name": "ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "product_id": "ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x", "product": { "name": "reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x", "product_id": "reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64", "product": { "name": "cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64", "product_id": "cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "product": { "name": "cluster-md-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "product_id": "cluster-md-kmp-preempt-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-5.3.18-150300.59.54.1.x86_64", "product": { "name": "dlm-kmp-default-5.3.18-150300.59.54.1.x86_64", "product_id": "dlm-kmp-default-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "product": { "name": "dlm-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "product_id": "dlm-kmp-preempt-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "product": { "name": "gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "product_id": "gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "product": { "name": "gfs2-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "product_id": "gfs2-kmp-preempt-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-5.3.18-150300.59.54.1.x86_64", "product": { "name": "kernel-debug-5.3.18-150300.59.54.1.x86_64", "product_id": "kernel-debug-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-5.3.18-150300.59.54.1.x86_64", "product": { "name": "kernel-debug-devel-5.3.18-150300.59.54.1.x86_64", "product_id": "kernel-debug-devel-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "product": { "name": "kernel-debug-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "product_id": "kernel-debug-livepatch-devel-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-5.3.18-150300.59.54.1.x86_64", "product": { "name": "kernel-default-5.3.18-150300.59.54.1.x86_64", "product_id": "kernel-default-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "product": { "name": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "product_id": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "product": { "name": "kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "product_id": "kernel-default-base-rebuild-5.3.18-150300.59.54.1.150300.18.35.3.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-5.3.18-150300.59.54.1.x86_64", "product": { "name": "kernel-default-devel-5.3.18-150300.59.54.1.x86_64", "product_id": "kernel-default-devel-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-5.3.18-150300.59.54.1.x86_64", "product": { "name": "kernel-default-extra-5.3.18-150300.59.54.1.x86_64", "product_id": "kernel-default-extra-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64", "product": { "name": "kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64", "product_id": "kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "product": { "name": "kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "product_id": "kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-optional-5.3.18-150300.59.54.1.x86_64", "product": { "name": "kernel-default-optional-5.3.18-150300.59.54.1.x86_64", "product_id": "kernel-default-optional-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-5.3.18-150300.59.54.1.x86_64", "product": { "name": "kernel-kvmsmall-5.3.18-150300.59.54.1.x86_64", "product_id": "kernel-kvmsmall-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-5.3.18-150300.59.54.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-5.3.18-150300.59.54.1.x86_64", "product_id": "kernel-kvmsmall-devel-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "product": { "name": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.x86_64", "product": { "name": "kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.x86_64", "product_id": "kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_54-preempt-1-150300.7.5.1.x86_64", "product": { "name": "kernel-livepatch-5_3_18-150300_59_54-preempt-1-150300.7.5.1.x86_64", "product_id": "kernel-livepatch-5_3_18-150300_59_54-preempt-1-150300.7.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-5.3.18-150300.59.54.1.x86_64", "product": { "name": "kernel-obs-build-5.3.18-150300.59.54.1.x86_64", "product_id": "kernel-obs-build-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-5.3.18-150300.59.54.1.x86_64", "product": { "name": "kernel-obs-qa-5.3.18-150300.59.54.1.x86_64", "product_id": "kernel-obs-qa-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-5.3.18-150300.59.54.1.x86_64", "product": { "name": "kernel-preempt-5.3.18-150300.59.54.1.x86_64", "product_id": "kernel-preempt-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64", "product": { "name": "kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64", "product_id": "kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64", "product": { "name": "kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64", "product_id": "kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "product": { "name": "kernel-preempt-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "product_id": "kernel-preempt-livepatch-devel-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-optional-5.3.18-150300.59.54.1.x86_64", "product": { "name": "kernel-preempt-optional-5.3.18-150300.59.54.1.x86_64", "product_id": "kernel-preempt-optional-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-5.3.18-150300.59.54.1.x86_64", "product": { "name": "kernel-syms-5.3.18-150300.59.54.1.x86_64", "product_id": "kernel-syms-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.3.18-150300.59.54.1.x86_64", "product": { "name": "kselftests-kmp-default-5.3.18-150300.59.54.1.x86_64", "product_id": "kselftests-kmp-default-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "product": { "name": "kselftests-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "product_id": "kselftests-kmp-preempt-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "product": { "name": "ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "product_id": "ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "product": { "name": "ocfs2-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "product_id": "ocfs2-kmp-preempt-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64", "product": { "name": "reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64", "product_id": "reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "product": { "name": "reiserfs-kmp-preempt-5.3.18-150300.59.54.1.x86_64", "product_id": "reiserfs-kmp-preempt-5.3.18-150300.59.54.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15 SP3", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Development Tools 15 SP3", "product": { "name": "SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-development-tools:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Legacy 15 SP3", "product": { "name": "SUSE Linux Enterprise Module for Legacy 15 SP3", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-legacy:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 15 SP3", "product": { "name": "SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 15 SP3", "product": { "name": "SUSE Linux Enterprise Workstation Extension 15 SP3", "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.1", "product": { "name": "SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-microos:5.1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-64kb-5.3.18-150300.59.54.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "kernel-64kb-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.54.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "kernel-default-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.54.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.ppc64le" }, "product_reference": "kernel-default-5.3.18-150300.59.54.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.54.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.s390x" }, "product_reference": "kernel-default-5.3.18-150300.59.54.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.54.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.x86_64" }, "product_reference": "kernel-default-5.3.18-150300.59.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64" }, "product_reference": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le" }, "product_reference": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x" }, "product_reference": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64" }, "product_reference": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-150300.59.54.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "kernel-default-devel-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-150300.59.54.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.ppc64le" }, "product_reference": "kernel-default-devel-5.3.18-150300.59.54.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-150300.59.54.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.s390x" }, "product_reference": "kernel-default-devel-5.3.18-150300.59.54.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-150300.59.54.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.x86_64" }, "product_reference": "kernel-default-devel-5.3.18-150300.59.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.3.18-150300.59.54.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.54.1.noarch" }, "product_reference": "kernel-devel-5.3.18-150300.59.54.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.3.18-150300.59.54.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.54.1.noarch" }, "product_reference": "kernel-macros-5.3.18-150300.59.54.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-150300.59.54.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "kernel-preempt-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-150300.59.54.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.x86_64" }, "product_reference": "kernel-preempt-5.3.18-150300.59.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-5.3.18-150300.59.54.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.54.1.s390x" }, "product_reference": "kernel-zfcpdump-5.3.18-150300.59.54.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-5.3.18-150300.59.54.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.54.1.noarch" }, "product_reference": "kernel-docs-5.3.18-150300.59.54.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-150300.59.54.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "kernel-obs-build-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-150300.59.54.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.ppc64le" }, "product_reference": "kernel-obs-build-5.3.18-150300.59.54.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-150300.59.54.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.s390x" }, "product_reference": "kernel-obs-build-5.3.18-150300.59.54.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-150300.59.54.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.x86_64" }, "product_reference": "kernel-obs-build-5.3.18-150300.59.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64" }, "product_reference": "kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.3.18-150300.59.54.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.54.1.noarch" }, "product_reference": "kernel-source-5.3.18-150300.59.54.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-150300.59.54.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "kernel-syms-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-150300.59.54.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.ppc64le" }, "product_reference": "kernel-syms-5.3.18-150300.59.54.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-150300.59.54.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.s390x" }, "product_reference": "kernel-syms-5.3.18-150300.59.54.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-150300.59.54.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.x86_64" }, "product_reference": "kernel-syms-5.3.18-150300.59.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP3", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP3", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP3", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x" }, "product_reference": "reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP3", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64" }, "product_reference": "reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le" }, "product_reference": "kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-5.3.18-150300.59.54.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.s390x" }, "product_reference": "kernel-default-livepatch-5.3.18-150300.59.54.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64" }, "product_reference": "kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le" }, "product_reference": "kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x" }, "product_reference": "kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64" }, "product_reference": "kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x" }, "product_reference": "cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64" }, "product_reference": "cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.3.18-150300.59.54.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "dlm-kmp-default-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le" }, "product_reference": "dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.3.18-150300.59.54.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.s390x" }, "product_reference": "dlm-kmp-default-5.3.18-150300.59.54.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.3.18-150300.59.54.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.x86_64" }, "product_reference": "dlm-kmp-default-5.3.18-150300.59.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le" }, "product_reference": "gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.3.18-150300.59.54.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.s390x" }, "product_reference": "gfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64" }, "product_reference": "gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x" }, "product_reference": "ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64" }, "product_reference": "ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-5.3.18-150300.59.54.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP3", "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.54.1.x86_64" }, "product_reference": "kernel-default-extra-5.3.18-150300.59.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP3", "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64" }, "product_reference": "kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.54.1.aarch64 as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.aarch64" }, "product_reference": "kernel-default-5.3.18-150300.59.54.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.54.1.s390x as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.s390x" }, "product_reference": "kernel-default-5.3.18-150300.59.54.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.54.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.x86_64" }, "product_reference": "kernel-default-5.3.18-150300.59.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64 as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64" }, "product_reference": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x" }, "product_reference": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64 as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64" }, "product_reference": "kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-0001", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0001" } ], "notes": [ { "category": "general", "text": "Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0001", "url": "https://www.suse.com/security/cve/CVE-2022-0001" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2022-0001", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2022-0001", "url": "https://bugzilla.suse.com/1196901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:07:32Z", "details": "moderate" } ], "title": "CVE-2022-0001" }, { "cve": "CVE-2022-0002", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0002" } ], "notes": [ { "category": "general", "text": "Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0002", "url": "https://www.suse.com/security/cve/CVE-2022-0002" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2022-0002", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2022-0002", "url": "https://bugzilla.suse.com/1196901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:07:32Z", "details": "moderate" } ], "title": "CVE-2022-0002" }, { "cve": "CVE-2022-0492", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0492" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in the Linux kernel\u0027s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0492", "url": "https://www.suse.com/security/cve/CVE-2022-0492" }, { "category": "external", "summary": "SUSE Bug 1195543 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1195543" }, { "category": "external", "summary": "SUSE Bug 1195908 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1195908" }, { "category": "external", "summary": "SUSE Bug 1196612 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1196612" }, { "category": "external", "summary": "SUSE Bug 1196776 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1196776" }, { "category": "external", "summary": "SUSE Bug 1198615 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1198615" }, { "category": "external", "summary": "SUSE Bug 1199255 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1199255" }, { "category": "external", "summary": "SUSE Bug 1199615 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1199615" }, { "category": "external", "summary": "SUSE Bug 1200084 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1200084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:07:32Z", "details": "moderate" } ], "title": "CVE-2022-0492" }, { "cve": "CVE-2022-0516", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0516" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in kvm_s390_guest_sida_op in the arch/s390/kvm/kvm-s390.c function in KVM for s390 in the Linux kernel. This flaw allows a local attacker with a normal user privilege to obtain unauthorized memory write access. This flaw affects Linux kernel versions prior to 5.17-rc4.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0516", "url": "https://www.suse.com/security/cve/CVE-2022-0516" }, { "category": "external", "summary": "SUSE Bug 1195516 for CVE-2022-0516", "url": "https://bugzilla.suse.com/1195516" }, { "category": "external", "summary": "SUSE Bug 1195947 for CVE-2022-0516", "url": "https://bugzilla.suse.com/1195947" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:07:32Z", "details": "important" } ], "title": "CVE-2022-0516" }, { "cve": "CVE-2022-0847", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0847" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way the \"flags\" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0847", "url": "https://www.suse.com/security/cve/CVE-2022-0847" }, { "category": "external", "summary": "SUSE Bug 1196584 for CVE-2022-0847", "url": "https://bugzilla.suse.com/1196584" }, { "category": "external", "summary": "SUSE Bug 1196601 for CVE-2022-0847", "url": "https://bugzilla.suse.com/1196601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:07:32Z", "details": "important" } ], "title": "CVE-2022-0847" }, { "cve": "CVE-2022-25375", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-25375" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/usb/gadget/function/rndis.c in the Linux kernel before 5.16.10. The RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command. Attackers can obtain sensitive information from kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-25375", "url": "https://www.suse.com/security/cve/CVE-2022-25375" }, { "category": "external", "summary": "SUSE Bug 1196235 for CVE-2022-25375", "url": "https://bugzilla.suse.com/1196235" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.54.1.150300.18.35.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.54.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.54.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.54.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:07:32Z", "details": "moderate" } ], "title": "CVE-2022-25375" } ] }
suse-su-2022:1196-1
Vulnerability from csaf_suse
Published
2022-04-14 06:56
Modified
2022-04-14 06:56
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP5 kernel was updated.
The following security bugs were fixed:
- CVE-2022-1016: Fixed a vulnerability in the nf_tables component of the netfilter subsystem. This vulnerability gives an attacker a powerful primitive that can be used to both read from and write to relative stack data, which can lead to arbitrary code execution. (bsc#1197227)
- CVE-2022-28389: Fixed a double free in drivers/net/can/usb/mcba_usb.c vulnerability in the Linux kernel. (bnc#1198033)
- CVE-2022-28390: Fixed a double free in drivers/net/can/usb/ems_usb.c vulnerability in the Linux kernel. (bnc#1198031)
- CVE-2022-28388: Fixed a double free in drivers/net/can/usb/usb_8dev.c vulnerability in the Linux kernel. (bnc#1198032)
- CVE-2022-0812: Fixed an incorrect header size calculations which could lead to a memory leak. (bsc#1196639)
- CVE-2022-1048: Fixed a race Condition in snd_pcm_hw_free leading to use-after-free due to the AB/BA lock with buffer_mutex and mmap_lock. (bsc#1197331)
- CVE-2022-0850: Fixed a kernel information leak vulnerability in iov_iter.c. (bsc#1196761)
- CVE-2022-26966: Fixed an issue in drivers/net/usb/sr9700.c, which allowed attackers to obtain sensitive information from the memory via crafted frame lengths from a USB device. (bsc#1196836)
- CVE-2021-45868: Fixed a wrong validation check in fs/quota/quota_tree.c which could lead to an use-after-free if there is a corrupted quota file. (bnc#1197366)
- CVE-2021-39713: Fixed a race condition in the network scheduling subsystem which could lead to a use-after-free. (bnc#1196973)
- CVE-2022-23036,CVE-2022-23037,CVE-2022-23038,CVE-2022-23039,CVE-2022-23040,CVE-2022-23041,CVE-2022-23042: Fixed multiple issues which could have lead to read/write access to memory pages or denial of service. These issues are related to the Xen PV device frontend drivers. (bsc#1196488)
- CVE-2022-26490: Fixed a buffer overflow in the st21nfca driver. An attacker with adjacent NFC access could crash the system or corrupt the system memory. (bsc#1196830)
- CVE-2022-0001,CVE-2022-0002,CVE-2022-23960: Fixed a new kind of speculation issues, exploitable via JITed eBPF for instance. (bsc#1191580)
- CVE-2022-27666: Fixed a buffer overflow vulnerability in IPsec ESP transformation code. This flaw allowed a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation. (bnc#1197462)
The following non-security bugs were fixed:
- asix: Add rx->ax_skb = NULL after usbnet_skb_return() (git-fixes).
- asix: Ensure asix_rx_fixup_info members are all reset (git-fixes).
- asix: Fix small memory leak in ax88772_unbind() (git-fixes).
- asix: fix uninit-value in asix_mdio_read() (git-fixes).
- asix: fix wrong return value in asix_check_host_enable() (git-fixes).
- ax88179_178a: Merge memcpy + le32_to_cpus to get_unaligned_le32 (bsc#1196018).
- block: bfq: fix bfq_set_next_ioprio_data() (bsc#1191451).
- block: fix ioprio_get(IOPRIO_WHO_PGRP) vs setuid(2) (bsc#1194586).
- can: dev: can_restart: fix use after free bug (git-fixes).
- cgroup: Correct privileges check in release_agent writes (bsc#1196723).
- cgroup: Allocate cgroup_file_ctx for kernfs_open_file->priv (bsc#1196723).
- cgroup: Use open-time cgroup namespace for process migration perm checks (bsc#1196723).
- dax: update to new mmu_notifier semantic (bsc#1184207).
- drm: add a locked version of drm_is_current_master (bsc#1197914).
- drm: drm_file struct kABI compatibility workaround (bsc#1197914).
- drm: protect drm_master pointers in drm_lease.c (bsc#1197914).
- drm: serialize drm_file.master with a new spinlock (bsc#1197914).
- drm: use the lookup lock in drm_is_current_master (bsc#1197914).
- EDAC: Fix calculation of returned address and next offset in edac_align_ptr() (bsc#1114648).
- ena_netdev: use generic power management (bsc#1197099 jsc#SLE-24125).
- ena: Remove rcu_read_lock() around XDP program invocation (bsc#1197099 jsc#SLE-24125).
- ethernet: amazon: ena: A typo fix in the file ena_com.h (bsc#1197099 jsc#SLE-24125).
- ext4: add check to prevent attempting to resize an fs with sparse_super2 (bsc#1197754).
- ext4: check for inconsistent extents between index and leaf block (bsc#1194163 bsc#1196339).
- ext4: check for out-of-order index extents in ext4_valid_extent_entries() (bsc#1194163 bsc#1196339).
- ext4: do not use the orphan list when migrating an inode (bsc#1197756).
- ext4: fix an use-after-free issue about data=journal writeback mode (bsc#1195482).
- ext4: Fix BUG_ON in ext4_bread when write quota data (bsc#1197755).
- ext4: fix error handling in ext4_restore_inline_data() (bsc#1197757).
- ext4: fix lazy initialization next schedule time computation in more granular unit (bsc#1194580).
- ext4: make sure quota gets properly shutdown on error (bsc#1195480).
- ext4: prevent partial update of the extent blocks (bsc#1194163 bsc#1196339).
- ext4: update i_disksize if direct write past ondisk size (bsc#1197806).
- genirq: Use rcu in kstat_irqs_usr() (bsc#1193738).
- gtp: fix an use-before-init in gtp_newlink() (git-fixes).
- IB/core: Fix ODP get user pages flow (git-fixes)
- IB/hfi1: Acquire lock to release TID entries when user file is closed (git-fixes)
- IB/hfi1: Adjust pkey entry in index 0 (git-fixes)
- IB/hfi1: Correct guard on eager buffer deallocation (git-fixes)
- IB/hfi1: Ensure pq is not left on waitlist (git-fixes)
- IB/hfi1: Fix another case where pq is left on waitlist (git-fixes)
- IB/hfi1: Fix error return code in parse_platform_config() (git-fixes)
- IB/hfi1: Fix leak of rcvhdrtail_dummy_kvaddr (git-fixes)
- IB/hfi1: Fix possible null-pointer dereference in _extend_sdma_tx_descs() (git-fixes)
- IB/hfi1: Insure use of smp_processor_id() is preempt disabled (git-fixes)
- IB/hfi1: Use kzalloc() for mmu_rb_handler allocation (git-fixes)
- IB/qib: Protect from buffer overflow in struct qib_user_sdma_pkt fields (git-fixes)
- IB/qib: Use struct_size() helper (git-fixes)
- IB/sa: Resolv use-after-free in ib_nl_make_request() (git-fixes)
- IB/umad: Return EIO in case of when device disassociated (git-fixes)
- IB/umad: Return EPOLLERR in case of when device disassociated (git-fixes)
- isofs: Fix out of bound access for corrupted isofs image (bsc#1194591).
- llc: fix netdevice reference leaks in llc_ui_bind() (git-fixes).
- macros.kernel-source: Fix conditional expansion. Fixes: bb95fef3cf19 ('rpm: Use bash for %() expansion (jsc#SLE-18234).')
- mdio: fix mdio-thunder.c dependency build error (git-fixes).
- mm: bdi: initialize bdi_min_ratio when bdi is unregistered (bsc#1197763).
- mm: drop NULL return check of pte_offset_map_lock() (bsc#1184207).
- mm/rmap: always do TTU_IGNORE_ACCESS (bsc#1184207).
- mm/rmap: update to new mmu_notifier semantic v2 (bsc#1184207).
- net: arc_emac: Fix memleak in arc_mdio_probe (git-fixes).
- net: asix: add proper error handling of usb read errors (git-fixes).
- net: asix: fix uninit value bugs (git-fixes).
- net: bcmgenet: Fix a resource leak in an error handling path in the probe functin (git-fixes).
- net: dp83867: Fix OF_MDIO config check (git-fixes).
- net: dsa: bcm_sf2: put device node before return (git-fixes).
- net: ena: Add capabilities field with support for ENI stats capability (bsc#1197099 jsc#SLE-24125).
- net: ena: Add debug prints for invalid req_id resets (bsc#1197099 jsc#SLE-24125).
- net: ena: add device distinct log prefix to files (bsc#1197099 jsc#SLE-24125).
- net: ena: add jiffies of last napi call to stats (bsc#1197099 jsc#SLE-24125).
- net: ena: aggregate doorbell common operations into a function (bsc#1197099 jsc#SLE-24125).
- net: ena: aggregate stats increase into a function (bsc#1197099 jsc#SLE-24125).
- net: ena: Change ENI stats support check to use capabilities field (bsc#1197099 jsc#SLE-24125).
- net: ena: Change return value of ena_calc_io_queue_size() to void (bsc#1197099 jsc#SLE-24125).
- net: ena: Change the name of bad_csum variable (bsc#1197099 jsc#SLE-24125).
- net: ena: Extract recurring driver reset code into a function (bsc#1197099 jsc#SLE-24125).
- net: ena: fix coding style nits (bsc#1197099 jsc#SLE-24125).
- net: ena: fix DMA mapping function issues in XDP (bsc#1197099 jsc#SLE-24125).
- net: ena: fix inaccurate print type (bsc#1197099 jsc#SLE-24125).
- net: ena: Fix wrong rx request id by resetting device (bsc#1197099 jsc#SLE-24125).
- net: ena: Improve error logging in driver (bsc#1197099 jsc#SLE-24125).
- net: ena: introduce ndo_xdp_xmit() function for XDP_REDIRECT (bsc#1197099 jsc#SLE-24125).
- net: ena: introduce XDP redirect implementation (bsc#1197099 jsc#SLE-24125).
- net: ena: make symbol 'ena_alloc_map_page' static (bsc#1197099 jsc#SLE-24125).
- net: ena: Move reset completion print to the reset function (bsc#1197099 jsc#SLE-24125).
- net: ena: optimize data access in fast-path code (bsc#1197099 jsc#SLE-24125).
- net: ena: re-organize code to improve readability (bsc#1197099 jsc#SLE-24125).
- net: ena: Remove ena_calc_queue_size_ctx struct (bsc#1197099 jsc#SLE-24125).
- net: ena: remove extra words from comments (bsc#1197099 jsc#SLE-24125).
- net: ena: Remove module param and change message severity (bsc#1197099 jsc#SLE-24125).
- net: ena: Remove redundant return code check (bsc#1197099 jsc#SLE-24125).
- net: ena: Remove unused code (bsc#1197099 jsc#SLE-24125).
- net: ena: store values in their appropriate variables types (bsc#1197099 jsc#SLE-24125).
- net: ena: Update XDP verdict upon failure (bsc#1197099 jsc#SLE-24125).
- net: ena: use build_skb() in RX path (bsc#1197099 jsc#SLE-24125).
- net: ena: use constant value for net_device allocation (bsc#1197099 jsc#SLE-24125).
- net: ena: Use dev_alloc() in RX buffer allocation (bsc#1197099 jsc#SLE-24125).
- net: ena: Use pci_sriov_configure_simple() to enable VFs (bsc#1197099 jsc#SLE-24125).
- net: ena: use xdp_frame in XDP TX flow (bsc#1197099 jsc#SLE-24125).
- net: ena: use xdp_return_frame() to free xdp frames (bsc#1197099 jsc#SLE-24125).
- net: ethernet: Fix memleak in ethoc_probe (git-fixes).
- net: ethernet: ti: cpts: fix ethtool output when no ptp_clock registered (git-fixes).
- net: fec: only check queue 0 if RXF_0/TXF_0 interrupt is set (git-fixes).
- net: hdlc_ppp: Fix issues when mod_timer is called while timer is running (git-fixes).
- net: hdlc_raw_eth: Clear the IFF_TX_SKB_SHARING flag after calling ether_setup (git-fixes).
- net: hdlc: In hdlc_rcv, check to make sure dev is an HDLC device (git-fixes).
- net: hns: fix return value check in __lb_other_process() (git-fixes).
- net: marvell: Fix OF_MDIO config check (git-fixes).
- net: mcs7830: handle usb read errors properly (git-fixes).
- net: usb: asix: add error handling for asix_mdio_* functions (git-fixes).
- net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup (bsc#1196018).
- net: usb: ax88179_178a: fix packet alignment padding (bsc#1196018).
- net/mlx5e: Fix page DMA map/unmap attributes (bsc#1196468).
- netxen_nic: fix MSI/MSI-x interrupts (git-fixes).
- NFS: Avoid duplicate uncached readdir calls on eof (git-fixes).
- NFS: Do not report writeback errors in nfs_getattr() (git-fixes).
- NFS: Do not skip directory entries when doing uncached readdir (git-fixes).
- NFS: Fix initialisation of nfs_client cl_flags field (git-fixes).
- NFS: Return valid errors from nfs2/3_decode_dirent() (git-fixes).
- NFS: Clamp WRITE offsets (git-fixes).
- NFS: nfsd4_setclientid_confirm mistakenly expires confirmed client (git-fixes).
- NFS: do not retry BIND_CONN_TO_SESSION on session error (git-fixes).
- NFS: Fix another issue with a list iterator pointing to the head (git-fixes).
- ocfs2: mount fails with buffer overflow in strlen (bsc#1197760).
- ocfs2: remove ocfs2_is_o2cb_active() (bsc#1197758).
- powercap: intel_rapl: add support for Sapphire Rapids (jsc#SLE-15288, jsc#ECO-2990).
- powerpc/64: Fix kernel stack 16-byte alignment (bsc#1196999 ltc#196609S git-fixes).
- powerpc/64: Interrupts save PPR on stack rather than thread_struct (bsc#1196999 ltc#196609).
- powerpc/perf: consolidate GPCI hcall structs into asm/hvcall.h (jec#SLE-23780).
- powerpc/pseries: Fix use after free in remove_phb_dynamic() (bsc#1065729).
- powerpc/pseries: Fix use after free in remove_phb_dynamic() (bsc#1065729).
- powerpc/pseries: new lparcfg key/value pair: partition_affinity_score (jec#SLE-23780).
- powerpc/sysdev: fix incorrect use to determine if list is empty (bsc#1065729).
- powerpc/tm: Fix more userspace r13 corruption (bsc#1065729).
- powerpc/tm: Fix more userspace r13 corruption (bsc#1065729).
- powerpc/xive: fix return value of __setup handler (bsc#1065729).
- printk: Add panic_in_progress helper (bsc#1197894).
- printk: disable optimistic spin during panic (bsc#1197894).
- qed: select CONFIG_CRC32 (git-fixes).
- quota: correct error number in free_dqentry() (bsc#1194590).
- RDMA/addr: Be strict with gid size (git-fixes)
- RDMA/bnxt_re: Fix a double free in bnxt_qplib_alloc_res (git-fixes)
- RDMA/bnxt_re: Fix error return code in bnxt_qplib_cq_process_terminal() (git-fixes)
- RDMA/bnxt_re: Scan the whole bitmap when checking if 'disabling RCFW with pending cmd-bit' (git-fixes)
- RDMA/bnxt_re: Set queue pair state when being queried (git-fixes)
- RDMA/cm: Fix an attempt to use non-valid pointer when cleaning timewait (git-fixes)
- RDMA/cma: Ensure rdma_addr_cancel() happens before issuing more requests (git-fixes)
- RDMA/cma: Let cma_resolve_ib_dev() continue search even after empty entry (git-fixes)
- RDMA/core: Do not infoleak GRH fields (git-fixes)
- RDMA/core: Let ib_find_gid() continue search even after empty entry (git-fixes)
- RDMA/cxgb4: add missing qpid increment (git-fixes)
- RDMA/cxgb4: check for ipv6 address properly while destroying listener (git-fixes)
- RDMA/cxgb4: Fix adapter LE hash errors while destroying ipv6 listening server (git-fixes)
- RDMA/cxgb4: Fix the reported max_recv_sge value (git-fixes)
- RDMA/cxgb4: Set queue pair state when being queried (git-fixes)
- RDMA/cxgb4: Validate the number of CQEs (git-fixes)
- RDMA/hns: Add a check for current state before modifying QP (git-fixes)
- RDMA/hns: Encapsulate some lines for setting sq size in user mode (git-fixes)
- RDMA/hns: Optimize hns_roce_modify_qp function (git-fixes)
- RDMA/hns: Prevent undefined behavior in hns_roce_set_user_sq_size() (git-fixes)
- RDMA/hns: Validate the pkey index (git-fixes)
- RDMA/i40iw: Fix error unwinding when i40iw_hmc_sd_one fails (git-fixes)
- RDMA/ib_srp: Fix a deadlock (git-fixes)
- RDMA/iwcm: Release resources if iw_cm module initialization fails (git-fixes)
- RDMA/mlx4: Do not continue event handler after memory allocation failure (git-fixes)
- RDMA/mlx4: Return missed an error if device does not support steering (git-fixes)
- RDMA/mlx5: Do not allow rereg of a ODP MR (git-fixes)
- RDMA/mlx5: Fix corruption of reg_pages in mlx5_ib_rereg_user_mr() (git-fixes)
- RDMA/mlx5: Fix potential race between destroy and CQE poll (git-fixes)
- RDMA/mlx5: Fix udata response upon SRQ creation (git-fixes)
- RDMA/mlx5: Put live in the correct place for ODP MRs (git-fixes)
- RDMA/odp: Lift umem_mutex out of ib_umem_odp_unmap_dma_pages() (git-fixes)
- RDMA/qedr: Fix NULL deref for query_qp on the GSI QP (git-fixes)
- RDMA/qib: Remove superfluous fallthrough statements (git-fixes)
- RDMA/rxe: Clear all QP fields if creation failed (git-fixes)
- RDMA/rxe: Compute PSN windows correctly (git-fixes)
- RDMA/rxe: Correct skb on loopback path (git-fixes)
- RDMA/rxe: Do not overwrite errno from ib_umem_get() (git-fixes)
- RDMA/rxe: Fix coding error in rxe_rcv_mcast_pkt (git-fixes)
- RDMA/rxe: Fix coding error in rxe_recv.c (git-fixes)
- RDMA/rxe: Fix extra copy in prepare_ack_packet (git-fixes)
- RDMA/rxe: Fix failure during driver load (git-fixes)
- RDMA/rxe: Fix missing kconfig dependency on CRYPTO (git-fixes)
- RDMA/rxe: Fix over copying in get_srq_wqe (git-fixes)
- RDMA/rxe: Fix panic when calling kmem_cache_create() (git-fixes)
- RDMA/rxe: Fix redundant call to ip_send_check (git-fixes)
- RDMA/rxe: Fix skb lifetime in rxe_rcv_mcast_pkt() (git-fixes)
- RDMA/rxe: Fix wrong port_cap_flags (git-fixes)
- RDMA/rxe: Handle skb_clone() failure in rxe_recv.c (git-fixes)
- RDMA/rxe: Remove rxe_link_layer() (git-fixes)
- RDMA/rxe: Return CQE error if invalid lkey was supplied (git-fixes)
- RDMA/ucma: Fix locking for ctx->events_reported (git-fixes)
- RDMA/usnic: Fix memleak in find_free_vf_and_create_qp_grp (git-fixes)
- RDMA/uverbs: Fix create WQ to use the given user handle (git-fixes)
- RDMA/uverbs: Tidy input validation of ib_uverbs_rereg_mr() (git-fixes)
- s390/bpf: Perform r1 range checking before accessing jit->seen_reg (git-fixes).
- s390/disassembler: increase ebpf disasm buffer size (git-fixes).
- scsi: lpfc: Copyright updates for 14.2.0.0 patches (bsc#1197675).
- scsi: lpfc: Drop lpfc_no_handler() (bsc#1197675).
- scsi: lpfc: Fix broken SLI4 abort path (bsc#1197675).
- scsi: lpfc: Fix locking for lpfc_sli_iocbq_lookup() (bsc#1197675).
- scsi: lpfc: Fix queue failures when recovering from PCI parity error (bsc#1197675 bsc#1196478).
- scsi: lpfc: Fix typos in comments (bsc#1197675).
- scsi: lpfc: Fix unload hang after back to back PCI EEH faults (bsc#1197675 bsc#1196478).
- scsi: lpfc: Improve PCI EEH Error and Recovery Handling (bsc#1197675 bsc#1196478).
- scsi: lpfc: Kill lpfc_bus_reset_handler() (bsc#1197675).
- scsi: lpfc: Reduce log messages seen after firmware download (bsc#1197675).
- scsi: lpfc: Remove failing soft_wwn support (bsc#1197675).
- scsi: lpfc: Remove NVMe support if kernel has NVME_FC disabled (bsc#1197675).
- scsi: lpfc: Remove redundant flush_workqueue() call (bsc#1197675).
- scsi: lpfc: SLI path split: Introduce lpfc_prep_wqe (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor Abort paths (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor base ELS paths and the FLOGI path (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor BSG paths (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor CT paths (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor fast and slow paths to native SLI4 (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor FDISC paths (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor lpfc_iocbq (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor LS_ACC paths (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor LS_RJT paths (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor misc ELS paths (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor PLOGI/PRLI/ADISC/LOGO paths (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor SCSI paths (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor the RSCN/SCR/RDF/EDC/FARPR paths (bsc#1197675).
- scsi: lpfc: Update lpfc version to 14.2.0.0 (bsc#1197675).
- scsi: lpfc: Update lpfc version to 14.2.0.1 (bsc#1197675).
- scsi: lpfc: Use fc_block_rport() (bsc#1197675).
- scsi: lpfc: Use kcalloc() (bsc#1197675).
- scsi: lpfc: Use rport as argument for lpfc_chk_tgt_mapped() (bsc#1197675).
- scsi: lpfc: Use rport as argument for lpfc_send_taskmgmt() (bsc#1197675).
- scsi: qla2xxx: Fix crash during module load unload test (bsc#1197661).
- scsi: qla2xxx: Fix disk failure to rediscover (bsc#1197661).
- scsi: qla2xxx: Fix hang due to session stuck (bsc#1197661).
- scsi: qla2xxx: Fix incorrect reporting of task management failure (bsc#1197661).
- scsi: qla2xxx: Fix laggy FC remote port session recovery (bsc#1197661).
- scsi: qla2xxx: Fix loss of NVMe namespaces after driver reload test (bsc#1197661).
- scsi: qla2xxx: Fix missed DMA unmap for NVMe ls requests (bsc#1197661).
- scsi: qla2xxx: Fix N2N inconsistent PLOGI (bsc#1197661).
- scsi: qla2xxx: Fix stuck session of PRLI reject (bsc#1197661).
- scsi: qla2xxx: Fix typos in comments (bsc#1197661).
- scsi: qla2xxx: Increase max limit of ql2xnvme_queues (bsc#1197661).
- scsi: qla2xxx: Reduce false trigger to login (bsc#1197661).
- scsi: qla2xxx: Stop using the SCSI pointer (bsc#1197661).
- scsi: qla2xxx: Update version to 10.02.07.400-k (bsc#1197661).
- scsi: qla2xxx: Use correct feature type field during RFF_ID processing (bsc#1197661).
- scsi: qla2xxx: Use named initializers for port_state_str (bsc#1197661).
- scsi: qla2xxx: Use named initializers for q_dev_state (bsc#1197661).
- sr9700: sanity check for packet length (bsc#1196836).
- SUNRPC: avoid race between mod_timer() and del_timer_sync() (bnc#1195403).
- SUNRPC: change locking for xs_swap_enable/disable (bsc#1196367).
- SUNRPC: Fix transport accounting when caller specifies an rpc_xprt (bsc#1197531).
- tcp: add some entropy in __inet_hash_connect() (bsc#1180153).
- tcp: change source port randomizarion at connect() time (bsc#1180153).
- tcp: Export tcp_{sendpage,sendmsg}_locked() for ipv6 (bsc#1194541).
- tracing: Fix return value of __setup handlers (git-fixes).
- USB: Add unusual-devs entry for VL817 USB-SATA bridge (git-fixes).
- USB: chipidea: fix interrupt deadlock (git-fixes).
- USB: core: Fix hang in usb_kill_urb by adding memory barriers (git-fixes).
- USB: ftdi-elan: fix memory leak on device disconnect (git-fixes).
- USB: host: xen-hcd: add missing unlock in error path (git-fixes).
- USB: host: xhci-rcar: Do not reload firmware after the completion (git-fixes).
- USB: serial: ch341: add support for GW Instek USB2.0-Serial devices (git-fixes).
- USB: serial: cp210x: add CPI Bulk Coin Recycler id (git-fixes).
- USB: serial: ftdi_sio: add support for Brainboxes US-159/235/320 (git-fixes).
- USB: serial: option: add support for DW5829e (git-fixes).
- USB: serial: option: add Telit LE910R1 compositions (git-fixes).
- USB: serial: option: add ZTE MF286D modem (git-fixes).
- USB: storage: ums-realtek: fix error code in rts51x_read_mem() (git-fixes).
- USB: zaurus: support another broken Zaurus (git-fixes).
- virtio_net: Fix recursive call to cpus_read_lock() (git-fixes).
- x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF + SMT (bsc#1114648).
- x86/speculation: Warn about Spectre v2 LFENCE mitigation (bsc#1114648).
- xen/gntdev: update to new mmu_notifier semantic (bsc#1184207).
- xen/usb: do not use gnttab_end_foreign_access() in xenhcd_gnttab_done() (bsc#1196488, XSA-396).
- xhci: Enable trust tx length quirk for Fresco FL11 USB controller (git-fixes).
- xhci: Fresco FL1100 controller should not have BROKEN_MSI quirk set (git-fixes).
- xhci: Prevent futile URB re-submissions due to incorrect return value (git-fixes).
- xhci: re-initialize the HC during resume if HCE was set (git-fixes).
Patchnames
SUSE-2022-1196,SUSE-SLE-HA-12-SP5-2022-1196,SUSE-SLE-Live-Patching-12-SP5-2022-1196,SUSE-SLE-SDK-12-SP5-2022-1196,SUSE-SLE-SERVER-12-SP5-2022-1196,SUSE-SLE-WE-12-SP5-2022-1196
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 12 SP5 kernel was updated.\n\nThe following security bugs were fixed:\n\n- CVE-2022-1016: Fixed a vulnerability in the nf_tables component of the netfilter subsystem. This vulnerability gives an attacker a powerful primitive that can be used to both read from and write to relative stack data, which can lead to arbitrary code execution. (bsc#1197227)\n- CVE-2022-28389: Fixed a double free in drivers/net/can/usb/mcba_usb.c vulnerability in the Linux kernel. (bnc#1198033)\n- CVE-2022-28390: Fixed a double free in drivers/net/can/usb/ems_usb.c vulnerability in the Linux kernel. (bnc#1198031)\n- CVE-2022-28388: Fixed a double free in drivers/net/can/usb/usb_8dev.c vulnerability in the Linux kernel. (bnc#1198032)\n- CVE-2022-0812: Fixed an incorrect header size calculations which could lead to a memory leak. (bsc#1196639)\n- CVE-2022-1048: Fixed a race Condition in snd_pcm_hw_free leading to use-after-free due to the AB/BA lock with buffer_mutex and mmap_lock. (bsc#1197331)\n- CVE-2022-0850: Fixed a kernel information leak vulnerability in iov_iter.c. (bsc#1196761)\n- CVE-2022-26966: Fixed an issue in drivers/net/usb/sr9700.c, which allowed attackers to obtain sensitive information from the memory via crafted frame lengths from a USB device. (bsc#1196836)\n- CVE-2021-45868: Fixed a wrong validation check in fs/quota/quota_tree.c which could lead to an use-after-free if there is a corrupted quota file. (bnc#1197366)\n- CVE-2021-39713: Fixed a race condition in the network scheduling subsystem which could lead to a use-after-free. (bnc#1196973)\n- CVE-2022-23036,CVE-2022-23037,CVE-2022-23038,CVE-2022-23039,CVE-2022-23040,CVE-2022-23041,CVE-2022-23042: Fixed multiple issues which could have lead to read/write access to memory pages or denial of service. These issues are related to the Xen PV device frontend drivers. (bsc#1196488)\n- CVE-2022-26490: Fixed a buffer overflow in the st21nfca driver. An attacker with adjacent NFC access could crash the system or corrupt the system memory. (bsc#1196830)\n- CVE-2022-0001,CVE-2022-0002,CVE-2022-23960: Fixed a new kind of speculation issues, exploitable via JITed eBPF for instance. (bsc#1191580)\n- CVE-2022-27666: Fixed a buffer overflow vulnerability in IPsec ESP transformation code. This flaw allowed a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation. (bnc#1197462)\n\nThe following non-security bugs were fixed:\n\n- asix: Add rx-\u003eax_skb = NULL after usbnet_skb_return() (git-fixes).\n- asix: Ensure asix_rx_fixup_info members are all reset (git-fixes).\n- asix: Fix small memory leak in ax88772_unbind() (git-fixes).\n- asix: fix uninit-value in asix_mdio_read() (git-fixes).\n- asix: fix wrong return value in asix_check_host_enable() (git-fixes).\n- ax88179_178a: Merge memcpy + le32_to_cpus to get_unaligned_le32 (bsc#1196018).\n- block: bfq: fix bfq_set_next_ioprio_data() (bsc#1191451).\n- block: fix ioprio_get(IOPRIO_WHO_PGRP) vs setuid(2) (bsc#1194586).\n- can: dev: can_restart: fix use after free bug (git-fixes).\n- cgroup: Correct privileges check in release_agent writes (bsc#1196723).\n- cgroup: Allocate cgroup_file_ctx for kernfs_open_file-\u003epriv (bsc#1196723).\n- cgroup: Use open-time cgroup namespace for process migration perm checks (bsc#1196723).\n- dax: update to new mmu_notifier semantic (bsc#1184207).\n- drm: add a locked version of drm_is_current_master (bsc#1197914).\n- drm: drm_file struct kABI compatibility workaround (bsc#1197914).\n- drm: protect drm_master pointers in drm_lease.c (bsc#1197914).\n- drm: serialize drm_file.master with a new spinlock (bsc#1197914).\n- drm: use the lookup lock in drm_is_current_master (bsc#1197914).\n- EDAC: Fix calculation of returned address and next offset in edac_align_ptr() (bsc#1114648).\n- ena_netdev: use generic power management (bsc#1197099 jsc#SLE-24125).\n- ena: Remove rcu_read_lock() around XDP program invocation (bsc#1197099 jsc#SLE-24125).\n- ethernet: amazon: ena: A typo fix in the file ena_com.h (bsc#1197099 jsc#SLE-24125).\n- ext4: add check to prevent attempting to resize an fs with sparse_super2 (bsc#1197754).\n- ext4: check for inconsistent extents between index and leaf block (bsc#1194163 bsc#1196339).\n- ext4: check for out-of-order index extents in ext4_valid_extent_entries() (bsc#1194163 bsc#1196339).\n- ext4: do not use the orphan list when migrating an inode (bsc#1197756).\n- ext4: fix an use-after-free issue about data=journal writeback mode (bsc#1195482).\n- ext4: Fix BUG_ON in ext4_bread when write quota data (bsc#1197755).\n- ext4: fix error handling in ext4_restore_inline_data() (bsc#1197757).\n- ext4: fix lazy initialization next schedule time computation in more granular unit (bsc#1194580).\n- ext4: make sure quota gets properly shutdown on error (bsc#1195480).\n- ext4: prevent partial update of the extent blocks (bsc#1194163 bsc#1196339).\n- ext4: update i_disksize if direct write past ondisk size (bsc#1197806).\n- genirq: Use rcu in kstat_irqs_usr() (bsc#1193738).\n- gtp: fix an use-before-init in gtp_newlink() (git-fixes).\n- IB/core: Fix ODP get user pages flow (git-fixes)\n- IB/hfi1: Acquire lock to release TID entries when user file is closed (git-fixes)\n- IB/hfi1: Adjust pkey entry in index 0 (git-fixes)\n- IB/hfi1: Correct guard on eager buffer deallocation (git-fixes)\n- IB/hfi1: Ensure pq is not left on waitlist (git-fixes)\n- IB/hfi1: Fix another case where pq is left on waitlist (git-fixes)\n- IB/hfi1: Fix error return code in parse_platform_config() (git-fixes)\n- IB/hfi1: Fix leak of rcvhdrtail_dummy_kvaddr (git-fixes)\n- IB/hfi1: Fix possible null-pointer dereference in _extend_sdma_tx_descs() (git-fixes)\n- IB/hfi1: Insure use of smp_processor_id() is preempt disabled (git-fixes)\n- IB/hfi1: Use kzalloc() for mmu_rb_handler allocation (git-fixes)\n- IB/qib: Protect from buffer overflow in struct qib_user_sdma_pkt fields (git-fixes)\n- IB/qib: Use struct_size() helper (git-fixes)\n- IB/sa: Resolv use-after-free in ib_nl_make_request() (git-fixes)\n- IB/umad: Return EIO in case of when device disassociated (git-fixes)\n- IB/umad: Return EPOLLERR in case of when device disassociated (git-fixes)\n- isofs: Fix out of bound access for corrupted isofs image (bsc#1194591).\n- llc: fix netdevice reference leaks in llc_ui_bind() (git-fixes).\n- macros.kernel-source: Fix conditional expansion. Fixes: bb95fef3cf19 (\u0027rpm: Use bash for %() expansion (jsc#SLE-18234).\u0027)\n- mdio: fix mdio-thunder.c dependency build error (git-fixes).\n- mm: bdi: initialize bdi_min_ratio when bdi is unregistered (bsc#1197763).\n- mm: drop NULL return check of pte_offset_map_lock() (bsc#1184207).\n- mm/rmap: always do TTU_IGNORE_ACCESS (bsc#1184207).\n- mm/rmap: update to new mmu_notifier semantic v2 (bsc#1184207).\n- net: arc_emac: Fix memleak in arc_mdio_probe (git-fixes).\n- net: asix: add proper error handling of usb read errors (git-fixes).\n- net: asix: fix uninit value bugs (git-fixes).\n- net: bcmgenet: Fix a resource leak in an error handling path in the probe functin (git-fixes).\n- net: dp83867: Fix OF_MDIO config check (git-fixes).\n- net: dsa: bcm_sf2: put device node before return (git-fixes).\n- net: ena: Add capabilities field with support for ENI stats capability (bsc#1197099 jsc#SLE-24125).\n- net: ena: Add debug prints for invalid req_id resets (bsc#1197099 jsc#SLE-24125).\n- net: ena: add device distinct log prefix to files (bsc#1197099 jsc#SLE-24125).\n- net: ena: add jiffies of last napi call to stats (bsc#1197099 jsc#SLE-24125).\n- net: ena: aggregate doorbell common operations into a function (bsc#1197099 jsc#SLE-24125).\n- net: ena: aggregate stats increase into a function (bsc#1197099 jsc#SLE-24125).\n- net: ena: Change ENI stats support check to use capabilities field (bsc#1197099 jsc#SLE-24125).\n- net: ena: Change return value of ena_calc_io_queue_size() to void (bsc#1197099 jsc#SLE-24125).\n- net: ena: Change the name of bad_csum variable (bsc#1197099 jsc#SLE-24125).\n- net: ena: Extract recurring driver reset code into a function (bsc#1197099 jsc#SLE-24125).\n- net: ena: fix coding style nits (bsc#1197099 jsc#SLE-24125).\n- net: ena: fix DMA mapping function issues in XDP (bsc#1197099 jsc#SLE-24125).\n- net: ena: fix inaccurate print type (bsc#1197099 jsc#SLE-24125).\n- net: ena: Fix wrong rx request id by resetting device (bsc#1197099 jsc#SLE-24125).\n- net: ena: Improve error logging in driver (bsc#1197099 jsc#SLE-24125).\n- net: ena: introduce ndo_xdp_xmit() function for XDP_REDIRECT (bsc#1197099 jsc#SLE-24125).\n- net: ena: introduce XDP redirect implementation (bsc#1197099 jsc#SLE-24125).\n- net: ena: make symbol \u0027ena_alloc_map_page\u0027 static (bsc#1197099 jsc#SLE-24125).\n- net: ena: Move reset completion print to the reset function (bsc#1197099 jsc#SLE-24125).\n- net: ena: optimize data access in fast-path code (bsc#1197099 jsc#SLE-24125).\n- net: ena: re-organize code to improve readability (bsc#1197099 jsc#SLE-24125).\n- net: ena: Remove ena_calc_queue_size_ctx struct (bsc#1197099 jsc#SLE-24125).\n- net: ena: remove extra words from comments (bsc#1197099 jsc#SLE-24125).\n- net: ena: Remove module param and change message severity (bsc#1197099 jsc#SLE-24125).\n- net: ena: Remove redundant return code check (bsc#1197099 jsc#SLE-24125).\n- net: ena: Remove unused code (bsc#1197099 jsc#SLE-24125).\n- net: ena: store values in their appropriate variables types (bsc#1197099 jsc#SLE-24125).\n- net: ena: Update XDP verdict upon failure (bsc#1197099 jsc#SLE-24125).\n- net: ena: use build_skb() in RX path (bsc#1197099 jsc#SLE-24125).\n- net: ena: use constant value for net_device allocation (bsc#1197099 jsc#SLE-24125).\n- net: ena: Use dev_alloc() in RX buffer allocation (bsc#1197099 jsc#SLE-24125).\n- net: ena: Use pci_sriov_configure_simple() to enable VFs (bsc#1197099 jsc#SLE-24125).\n- net: ena: use xdp_frame in XDP TX flow (bsc#1197099 jsc#SLE-24125).\n- net: ena: use xdp_return_frame() to free xdp frames (bsc#1197099 jsc#SLE-24125).\n- net: ethernet: Fix memleak in ethoc_probe (git-fixes).\n- net: ethernet: ti: cpts: fix ethtool output when no ptp_clock registered (git-fixes).\n- net: fec: only check queue 0 if RXF_0/TXF_0 interrupt is set (git-fixes).\n- net: hdlc_ppp: Fix issues when mod_timer is called while timer is running (git-fixes).\n- net: hdlc_raw_eth: Clear the IFF_TX_SKB_SHARING flag after calling ether_setup (git-fixes).\n- net: hdlc: In hdlc_rcv, check to make sure dev is an HDLC device (git-fixes).\n- net: hns: fix return value check in __lb_other_process() (git-fixes).\n- net: marvell: Fix OF_MDIO config check (git-fixes).\n- net: mcs7830: handle usb read errors properly (git-fixes).\n- net: usb: asix: add error handling for asix_mdio_* functions (git-fixes).\n- net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup (bsc#1196018).\n- net: usb: ax88179_178a: fix packet alignment padding (bsc#1196018).\n- net/mlx5e: Fix page DMA map/unmap attributes (bsc#1196468).\n- netxen_nic: fix MSI/MSI-x interrupts (git-fixes).\n- NFS: Avoid duplicate uncached readdir calls on eof (git-fixes).\n- NFS: Do not report writeback errors in nfs_getattr() (git-fixes).\n- NFS: Do not skip directory entries when doing uncached readdir (git-fixes).\n- NFS: Fix initialisation of nfs_client cl_flags field (git-fixes).\n- NFS: Return valid errors from nfs2/3_decode_dirent() (git-fixes).\n- NFS: Clamp WRITE offsets (git-fixes).\n- NFS: nfsd4_setclientid_confirm mistakenly expires confirmed client (git-fixes).\n- NFS: do not retry BIND_CONN_TO_SESSION on session error (git-fixes).\n- NFS: Fix another issue with a list iterator pointing to the head (git-fixes).\n- ocfs2: mount fails with buffer overflow in strlen (bsc#1197760).\n- ocfs2: remove ocfs2_is_o2cb_active() (bsc#1197758).\n- powercap: intel_rapl: add support for Sapphire Rapids (jsc#SLE-15288, jsc#ECO-2990).\n- powerpc/64: Fix kernel stack 16-byte alignment (bsc#1196999 ltc#196609S git-fixes).\n- powerpc/64: Interrupts save PPR on stack rather than thread_struct (bsc#1196999 ltc#196609).\n- powerpc/perf: consolidate GPCI hcall structs into asm/hvcall.h (jec#SLE-23780).\n- powerpc/pseries: Fix use after free in remove_phb_dynamic() (bsc#1065729).\n- powerpc/pseries: Fix use after free in remove_phb_dynamic() (bsc#1065729).\n- powerpc/pseries: new lparcfg key/value pair: partition_affinity_score (jec#SLE-23780).\n- powerpc/sysdev: fix incorrect use to determine if list is empty (bsc#1065729).\n- powerpc/tm: Fix more userspace r13 corruption (bsc#1065729).\n- powerpc/tm: Fix more userspace r13 corruption (bsc#1065729).\n- powerpc/xive: fix return value of __setup handler (bsc#1065729).\n- printk: Add panic_in_progress helper (bsc#1197894).\n- printk: disable optimistic spin during panic (bsc#1197894).\n- qed: select CONFIG_CRC32 (git-fixes).\n- quota: correct error number in free_dqentry() (bsc#1194590).\n- RDMA/addr: Be strict with gid size (git-fixes)\n- RDMA/bnxt_re: Fix a double free in bnxt_qplib_alloc_res (git-fixes)\n- RDMA/bnxt_re: Fix error return code in bnxt_qplib_cq_process_terminal() (git-fixes)\n- RDMA/bnxt_re: Scan the whole bitmap when checking if \u0027disabling RCFW with pending cmd-bit\u0027 (git-fixes)\n- RDMA/bnxt_re: Set queue pair state when being queried (git-fixes)\n- RDMA/cm: Fix an attempt to use non-valid pointer when cleaning timewait (git-fixes)\n- RDMA/cma: Ensure rdma_addr_cancel() happens before issuing more requests (git-fixes)\n- RDMA/cma: Let cma_resolve_ib_dev() continue search even after empty entry (git-fixes)\n- RDMA/core: Do not infoleak GRH fields (git-fixes)\n- RDMA/core: Let ib_find_gid() continue search even after empty entry (git-fixes)\n- RDMA/cxgb4: add missing qpid increment (git-fixes)\n- RDMA/cxgb4: check for ipv6 address properly while destroying listener (git-fixes)\n- RDMA/cxgb4: Fix adapter LE hash errors while destroying ipv6 listening server (git-fixes)\n- RDMA/cxgb4: Fix the reported max_recv_sge value (git-fixes)\n- RDMA/cxgb4: Set queue pair state when being queried (git-fixes)\n- RDMA/cxgb4: Validate the number of CQEs (git-fixes)\n- RDMA/hns: Add a check for current state before modifying QP (git-fixes)\n- RDMA/hns: Encapsulate some lines for setting sq size in user mode (git-fixes)\n- RDMA/hns: Optimize hns_roce_modify_qp function (git-fixes)\n- RDMA/hns: Prevent undefined behavior in hns_roce_set_user_sq_size() (git-fixes)\n- RDMA/hns: Validate the pkey index (git-fixes)\n- RDMA/i40iw: Fix error unwinding when i40iw_hmc_sd_one fails (git-fixes)\n- RDMA/ib_srp: Fix a deadlock (git-fixes)\n- RDMA/iwcm: Release resources if iw_cm module initialization fails (git-fixes)\n- RDMA/mlx4: Do not continue event handler after memory allocation failure (git-fixes)\n- RDMA/mlx4: Return missed an error if device does not support steering (git-fixes)\n- RDMA/mlx5: Do not allow rereg of a ODP MR (git-fixes)\n- RDMA/mlx5: Fix corruption of reg_pages in mlx5_ib_rereg_user_mr() (git-fixes)\n- RDMA/mlx5: Fix potential race between destroy and CQE poll (git-fixes)\n- RDMA/mlx5: Fix udata response upon SRQ creation (git-fixes)\n- RDMA/mlx5: Put live in the correct place for ODP MRs (git-fixes)\n- RDMA/odp: Lift umem_mutex out of ib_umem_odp_unmap_dma_pages() (git-fixes)\n- RDMA/qedr: Fix NULL deref for query_qp on the GSI QP (git-fixes)\n- RDMA/qib: Remove superfluous fallthrough statements (git-fixes)\n- RDMA/rxe: Clear all QP fields if creation failed (git-fixes)\n- RDMA/rxe: Compute PSN windows correctly (git-fixes)\n- RDMA/rxe: Correct skb on loopback path (git-fixes)\n- RDMA/rxe: Do not overwrite errno from ib_umem_get() (git-fixes)\n- RDMA/rxe: Fix coding error in rxe_rcv_mcast_pkt (git-fixes)\n- RDMA/rxe: Fix coding error in rxe_recv.c (git-fixes)\n- RDMA/rxe: Fix extra copy in prepare_ack_packet (git-fixes)\n- RDMA/rxe: Fix failure during driver load (git-fixes)\n- RDMA/rxe: Fix missing kconfig dependency on CRYPTO (git-fixes)\n- RDMA/rxe: Fix over copying in get_srq_wqe (git-fixes)\n- RDMA/rxe: Fix panic when calling kmem_cache_create() (git-fixes)\n- RDMA/rxe: Fix redundant call to ip_send_check (git-fixes)\n- RDMA/rxe: Fix skb lifetime in rxe_rcv_mcast_pkt() (git-fixes)\n- RDMA/rxe: Fix wrong port_cap_flags (git-fixes)\n- RDMA/rxe: Handle skb_clone() failure in rxe_recv.c (git-fixes)\n- RDMA/rxe: Remove rxe_link_layer() (git-fixes)\n- RDMA/rxe: Return CQE error if invalid lkey was supplied (git-fixes)\n- RDMA/ucma: Fix locking for ctx-\u003eevents_reported (git-fixes)\n- RDMA/usnic: Fix memleak in find_free_vf_and_create_qp_grp (git-fixes)\n- RDMA/uverbs: Fix create WQ to use the given user handle (git-fixes)\n- RDMA/uverbs: Tidy input validation of ib_uverbs_rereg_mr() (git-fixes)\n- s390/bpf: Perform r1 range checking before accessing jit-\u003eseen_reg (git-fixes).\n- s390/disassembler: increase ebpf disasm buffer size (git-fixes).\n- scsi: lpfc: Copyright updates for 14.2.0.0 patches (bsc#1197675).\n- scsi: lpfc: Drop lpfc_no_handler() (bsc#1197675).\n- scsi: lpfc: Fix broken SLI4 abort path (bsc#1197675).\n- scsi: lpfc: Fix locking for lpfc_sli_iocbq_lookup() (bsc#1197675).\n- scsi: lpfc: Fix queue failures when recovering from PCI parity error (bsc#1197675 bsc#1196478).\n- scsi: lpfc: Fix typos in comments (bsc#1197675).\n- scsi: lpfc: Fix unload hang after back to back PCI EEH faults (bsc#1197675 bsc#1196478).\n- scsi: lpfc: Improve PCI EEH Error and Recovery Handling (bsc#1197675 bsc#1196478).\n- scsi: lpfc: Kill lpfc_bus_reset_handler() (bsc#1197675).\n- scsi: lpfc: Reduce log messages seen after firmware download (bsc#1197675).\n- scsi: lpfc: Remove failing soft_wwn support (bsc#1197675).\n- scsi: lpfc: Remove NVMe support if kernel has NVME_FC disabled (bsc#1197675).\n- scsi: lpfc: Remove redundant flush_workqueue() call (bsc#1197675).\n- scsi: lpfc: SLI path split: Introduce lpfc_prep_wqe (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor Abort paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor base ELS paths and the FLOGI path (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor BSG paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor CT paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor fast and slow paths to native SLI4 (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor FDISC paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor lpfc_iocbq (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor LS_ACC paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor LS_RJT paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor misc ELS paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor PLOGI/PRLI/ADISC/LOGO paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor SCSI paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor the RSCN/SCR/RDF/EDC/FARPR paths (bsc#1197675).\n- scsi: lpfc: Update lpfc version to 14.2.0.0 (bsc#1197675).\n- scsi: lpfc: Update lpfc version to 14.2.0.1 (bsc#1197675).\n- scsi: lpfc: Use fc_block_rport() (bsc#1197675).\n- scsi: lpfc: Use kcalloc() (bsc#1197675).\n- scsi: lpfc: Use rport as argument for lpfc_chk_tgt_mapped() (bsc#1197675).\n- scsi: lpfc: Use rport as argument for lpfc_send_taskmgmt() (bsc#1197675).\n- scsi: qla2xxx: Fix crash during module load unload test (bsc#1197661).\n- scsi: qla2xxx: Fix disk failure to rediscover (bsc#1197661).\n- scsi: qla2xxx: Fix hang due to session stuck (bsc#1197661).\n- scsi: qla2xxx: Fix incorrect reporting of task management failure (bsc#1197661).\n- scsi: qla2xxx: Fix laggy FC remote port session recovery (bsc#1197661).\n- scsi: qla2xxx: Fix loss of NVMe namespaces after driver reload test (bsc#1197661).\n- scsi: qla2xxx: Fix missed DMA unmap for NVMe ls requests (bsc#1197661).\n- scsi: qla2xxx: Fix N2N inconsistent PLOGI (bsc#1197661).\n- scsi: qla2xxx: Fix stuck session of PRLI reject (bsc#1197661).\n- scsi: qla2xxx: Fix typos in comments (bsc#1197661).\n- scsi: qla2xxx: Increase max limit of ql2xnvme_queues (bsc#1197661).\n- scsi: qla2xxx: Reduce false trigger to login (bsc#1197661).\n- scsi: qla2xxx: Stop using the SCSI pointer (bsc#1197661).\n- scsi: qla2xxx: Update version to 10.02.07.400-k (bsc#1197661).\n- scsi: qla2xxx: Use correct feature type field during RFF_ID processing (bsc#1197661).\n- scsi: qla2xxx: Use named initializers for port_state_str (bsc#1197661).\n- scsi: qla2xxx: Use named initializers for q_dev_state (bsc#1197661).\n- sr9700: sanity check for packet length (bsc#1196836).\n- SUNRPC: avoid race between mod_timer() and del_timer_sync() (bnc#1195403).\n- SUNRPC: change locking for xs_swap_enable/disable (bsc#1196367).\n- SUNRPC: Fix transport accounting when caller specifies an rpc_xprt (bsc#1197531).\n- tcp: add some entropy in __inet_hash_connect() (bsc#1180153).\n- tcp: change source port randomizarion at connect() time (bsc#1180153).\n- tcp: Export tcp_{sendpage,sendmsg}_locked() for ipv6 (bsc#1194541).\n- tracing: Fix return value of __setup handlers (git-fixes).\n- USB: Add unusual-devs entry for VL817 USB-SATA bridge (git-fixes).\n- USB: chipidea: fix interrupt deadlock (git-fixes).\n- USB: core: Fix hang in usb_kill_urb by adding memory barriers (git-fixes).\n- USB: ftdi-elan: fix memory leak on device disconnect (git-fixes).\n- USB: host: xen-hcd: add missing unlock in error path (git-fixes).\n- USB: host: xhci-rcar: Do not reload firmware after the completion (git-fixes).\n- USB: serial: ch341: add support for GW Instek USB2.0-Serial devices (git-fixes).\n- USB: serial: cp210x: add CPI Bulk Coin Recycler id (git-fixes).\n- USB: serial: ftdi_sio: add support for Brainboxes US-159/235/320 (git-fixes).\n- USB: serial: option: add support for DW5829e (git-fixes).\n- USB: serial: option: add Telit LE910R1 compositions (git-fixes).\n- USB: serial: option: add ZTE MF286D modem (git-fixes).\n- USB: storage: ums-realtek: fix error code in rts51x_read_mem() (git-fixes).\n- USB: zaurus: support another broken Zaurus (git-fixes).\n- virtio_net: Fix recursive call to cpus_read_lock() (git-fixes).\n- x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF + SMT (bsc#1114648).\n- x86/speculation: Warn about Spectre v2 LFENCE mitigation (bsc#1114648).\n- xen/gntdev: update to new mmu_notifier semantic (bsc#1184207).\n- xen/usb: do not use gnttab_end_foreign_access() in xenhcd_gnttab_done() (bsc#1196488, XSA-396).\n- xhci: Enable trust tx length quirk for Fresco FL11 USB controller (git-fixes).\n- xhci: Fresco FL1100 controller should not have BROKEN_MSI quirk set (git-fixes).\n- xhci: Prevent futile URB re-submissions due to incorrect return value (git-fixes).\n- xhci: re-initialize the HC during resume if HCE was set (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-1196,SUSE-SLE-HA-12-SP5-2022-1196,SUSE-SLE-Live-Patching-12-SP5-2022-1196,SUSE-SLE-SDK-12-SP5-2022-1196,SUSE-SLE-SERVER-12-SP5-2022-1196,SUSE-SLE-WE-12-SP5-2022-1196", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_1196-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:1196-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20221196-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:1196-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-April/010723.html" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1114648", "url": "https://bugzilla.suse.com/1114648" }, { "category": "self", "summary": "SUSE Bug 1180153", "url": "https://bugzilla.suse.com/1180153" }, { "category": "self", "summary": "SUSE Bug 1184207", "url": "https://bugzilla.suse.com/1184207" }, { "category": "self", "summary": "SUSE Bug 1189562", "url": "https://bugzilla.suse.com/1189562" }, { "category": "self", "summary": "SUSE Bug 1191428", "url": "https://bugzilla.suse.com/1191428" }, { "category": "self", "summary": "SUSE Bug 1191451", "url": "https://bugzilla.suse.com/1191451" }, { "category": "self", "summary": "SUSE Bug 1191580", "url": "https://bugzilla.suse.com/1191580" }, { "category": "self", "summary": "SUSE Bug 1192273", "url": "https://bugzilla.suse.com/1192273" }, { "category": "self", "summary": "SUSE Bug 1193738", "url": "https://bugzilla.suse.com/1193738" }, { "category": "self", "summary": "SUSE Bug 1194163", "url": "https://bugzilla.suse.com/1194163" }, { "category": "self", "summary": "SUSE Bug 1194541", "url": "https://bugzilla.suse.com/1194541" }, { "category": "self", "summary": "SUSE Bug 1194580", "url": "https://bugzilla.suse.com/1194580" }, { "category": "self", "summary": "SUSE Bug 1194586", "url": "https://bugzilla.suse.com/1194586" }, { "category": "self", "summary": "SUSE Bug 1194590", "url": "https://bugzilla.suse.com/1194590" }, { "category": "self", "summary": "SUSE Bug 1194591", "url": "https://bugzilla.suse.com/1194591" }, { "category": "self", "summary": "SUSE Bug 1194943", "url": "https://bugzilla.suse.com/1194943" }, { "category": "self", "summary": "SUSE Bug 1195051", "url": "https://bugzilla.suse.com/1195051" }, { "category": "self", "summary": "SUSE Bug 1195353", "url": "https://bugzilla.suse.com/1195353" }, { "category": "self", "summary": "SUSE Bug 1195403", "url": "https://bugzilla.suse.com/1195403" }, { "category": "self", "summary": "SUSE Bug 1195480", "url": "https://bugzilla.suse.com/1195480" }, { "category": "self", "summary": "SUSE Bug 1195482", "url": "https://bugzilla.suse.com/1195482" }, { "category": "self", "summary": "SUSE Bug 1196018", "url": "https://bugzilla.suse.com/1196018" }, { "category": "self", "summary": "SUSE Bug 1196114", "url": "https://bugzilla.suse.com/1196114" }, { "category": "self", "summary": "SUSE Bug 1196339", "url": "https://bugzilla.suse.com/1196339" }, { "category": "self", "summary": "SUSE Bug 1196367", "url": "https://bugzilla.suse.com/1196367" }, { "category": "self", "summary": "SUSE Bug 1196468", "url": "https://bugzilla.suse.com/1196468" }, { "category": "self", "summary": "SUSE Bug 1196478", "url": "https://bugzilla.suse.com/1196478" }, { "category": "self", "summary": "SUSE Bug 1196488", "url": "https://bugzilla.suse.com/1196488" }, { "category": "self", "summary": "SUSE Bug 1196514", "url": "https://bugzilla.suse.com/1196514" }, { "category": "self", "summary": "SUSE Bug 1196639", "url": "https://bugzilla.suse.com/1196639" }, { "category": "self", "summary": "SUSE Bug 1196657", "url": "https://bugzilla.suse.com/1196657" }, { "category": "self", "summary": "SUSE Bug 1196723", "url": "https://bugzilla.suse.com/1196723" }, { "category": "self", "summary": "SUSE Bug 1196761", "url": "https://bugzilla.suse.com/1196761" }, { "category": "self", "summary": "SUSE Bug 1196830", "url": "https://bugzilla.suse.com/1196830" }, { "category": "self", "summary": "SUSE Bug 1196836", "url": "https://bugzilla.suse.com/1196836" }, { "category": "self", "summary": "SUSE Bug 1196901", "url": "https://bugzilla.suse.com/1196901" }, { "category": "self", "summary": "SUSE Bug 1196942", "url": "https://bugzilla.suse.com/1196942" }, { "category": "self", "summary": "SUSE Bug 1196973", "url": "https://bugzilla.suse.com/1196973" }, { "category": "self", "summary": "SUSE Bug 1196999", "url": "https://bugzilla.suse.com/1196999" }, { "category": "self", "summary": "SUSE Bug 1197099", "url": "https://bugzilla.suse.com/1197099" }, { "category": "self", "summary": "SUSE Bug 1197227", "url": "https://bugzilla.suse.com/1197227" }, { "category": "self", "summary": "SUSE Bug 1197331", "url": "https://bugzilla.suse.com/1197331" }, { "category": "self", "summary": "SUSE Bug 1197366", "url": "https://bugzilla.suse.com/1197366" }, { "category": "self", "summary": "SUSE Bug 1197462", "url": "https://bugzilla.suse.com/1197462" }, { "category": "self", "summary": "SUSE Bug 1197531", "url": "https://bugzilla.suse.com/1197531" }, { "category": "self", "summary": "SUSE Bug 1197661", "url": "https://bugzilla.suse.com/1197661" }, { "category": "self", "summary": "SUSE Bug 1197675", "url": "https://bugzilla.suse.com/1197675" }, { "category": "self", "summary": "SUSE Bug 1197754", "url": "https://bugzilla.suse.com/1197754" }, { "category": "self", "summary": "SUSE Bug 1197755", "url": "https://bugzilla.suse.com/1197755" }, { "category": "self", "summary": "SUSE Bug 1197756", "url": "https://bugzilla.suse.com/1197756" }, { "category": "self", "summary": "SUSE Bug 1197757", "url": "https://bugzilla.suse.com/1197757" }, { "category": "self", "summary": "SUSE Bug 1197758", "url": "https://bugzilla.suse.com/1197758" }, { "category": "self", "summary": "SUSE Bug 1197760", "url": "https://bugzilla.suse.com/1197760" }, { "category": "self", "summary": "SUSE Bug 1197763", "url": "https://bugzilla.suse.com/1197763" }, { "category": "self", "summary": "SUSE Bug 1197806", "url": "https://bugzilla.suse.com/1197806" }, { "category": "self", "summary": "SUSE Bug 1197894", "url": "https://bugzilla.suse.com/1197894" }, { "category": "self", "summary": "SUSE Bug 1197914", "url": "https://bugzilla.suse.com/1197914" }, { "category": "self", "summary": "SUSE Bug 1198031", "url": "https://bugzilla.suse.com/1198031" }, { "category": "self", "summary": "SUSE Bug 1198032", "url": "https://bugzilla.suse.com/1198032" }, { "category": "self", "summary": "SUSE Bug 1198033", "url": "https://bugzilla.suse.com/1198033" }, { "category": "self", "summary": "SUSE CVE CVE-2021-39713 page", "url": "https://www.suse.com/security/cve/CVE-2021-39713/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-45868 page", "url": "https://www.suse.com/security/cve/CVE-2021-45868/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0001 page", "url": "https://www.suse.com/security/cve/CVE-2022-0001/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0002 page", "url": "https://www.suse.com/security/cve/CVE-2022-0002/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0812 page", "url": "https://www.suse.com/security/cve/CVE-2022-0812/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0850 page", "url": "https://www.suse.com/security/cve/CVE-2022-0850/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1016 page", "url": "https://www.suse.com/security/cve/CVE-2022-1016/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1048 page", "url": "https://www.suse.com/security/cve/CVE-2022-1048/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23036 page", "url": "https://www.suse.com/security/cve/CVE-2022-23036/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23037 page", "url": "https://www.suse.com/security/cve/CVE-2022-23037/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23038 page", "url": "https://www.suse.com/security/cve/CVE-2022-23038/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23039 page", "url": "https://www.suse.com/security/cve/CVE-2022-23039/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23040 page", "url": "https://www.suse.com/security/cve/CVE-2022-23040/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23041 page", "url": "https://www.suse.com/security/cve/CVE-2022-23041/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23042 page", "url": "https://www.suse.com/security/cve/CVE-2022-23042/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23960 page", "url": "https://www.suse.com/security/cve/CVE-2022-23960/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-26490 page", "url": "https://www.suse.com/security/cve/CVE-2022-26490/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-26966 page", "url": "https://www.suse.com/security/cve/CVE-2022-26966/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-27666 page", "url": "https://www.suse.com/security/cve/CVE-2022-27666/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-28388 page", "url": "https://www.suse.com/security/cve/CVE-2022-28388/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-28389 page", "url": "https://www.suse.com/security/cve/CVE-2022-28389/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-28390 page", "url": "https://www.suse.com/security/cve/CVE-2022-28390/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2022-04-14T06:56:48Z", "generator": { "date": "2022-04-14T06:56:48Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:1196-1", "initial_release_date": "2022-04-14T06:56:48Z", "revision_history": [ { "date": "2022-04-14T06:56:48Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-122.116.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.12.14-122.116.1.aarch64", "product_id": "cluster-md-kmp-default-4.12.14-122.116.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-122.116.1.aarch64", "product": { "name": "dlm-kmp-default-4.12.14-122.116.1.aarch64", "product_id": "dlm-kmp-default-4.12.14-122.116.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-122.116.1.aarch64", "product": { "name": "gfs2-kmp-default-4.12.14-122.116.1.aarch64", "product_id": "gfs2-kmp-default-4.12.14-122.116.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-122.116.1.aarch64", "product": { "name": "kernel-default-4.12.14-122.116.1.aarch64", "product_id": "kernel-default-4.12.14-122.116.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-122.116.1.aarch64", "product": { "name": "kernel-default-base-4.12.14-122.116.1.aarch64", "product_id": "kernel-default-base-4.12.14-122.116.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-122.116.1.aarch64", "product": { "name": "kernel-default-devel-4.12.14-122.116.1.aarch64", "product_id": "kernel-default-devel-4.12.14-122.116.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-122.116.1.aarch64", "product": { "name": "kernel-default-extra-4.12.14-122.116.1.aarch64", "product_id": "kernel-default-extra-4.12.14-122.116.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-122.116.1.aarch64", "product": { "name": "kernel-default-kgraft-4.12.14-122.116.1.aarch64", "product_id": "kernel-default-kgraft-4.12.14-122.116.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-122.116.1.aarch64", "product": { "name": "kernel-default-kgraft-devel-4.12.14-122.116.1.aarch64", "product_id": "kernel-default-kgraft-devel-4.12.14-122.116.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-122.116.1.aarch64", "product": { "name": "kernel-obs-build-4.12.14-122.116.1.aarch64", "product_id": "kernel-obs-build-4.12.14-122.116.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-122.116.1.aarch64", "product": { "name": "kernel-obs-qa-4.12.14-122.116.1.aarch64", "product_id": "kernel-obs-qa-4.12.14-122.116.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-122.116.1.aarch64", "product": { "name": "kernel-syms-4.12.14-122.116.1.aarch64", "product_id": "kernel-syms-4.12.14-122.116.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-122.116.1.aarch64", "product": { "name": "kernel-vanilla-4.12.14-122.116.1.aarch64", "product_id": "kernel-vanilla-4.12.14-122.116.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-122.116.1.aarch64", "product": { "name": "kernel-vanilla-base-4.12.14-122.116.1.aarch64", "product_id": "kernel-vanilla-base-4.12.14-122.116.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-122.116.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.12.14-122.116.1.aarch64", "product_id": "kernel-vanilla-devel-4.12.14-122.116.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-122.116.1.aarch64", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-122.116.1.aarch64", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.116.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-122.116.1.aarch64", "product": { "name": "kselftests-kmp-default-4.12.14-122.116.1.aarch64", "product_id": "kselftests-kmp-default-4.12.14-122.116.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-122.116.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.12.14-122.116.1.aarch64", "product_id": "ocfs2-kmp-default-4.12.14-122.116.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-122.116.1.noarch", "product": { "name": "kernel-devel-4.12.14-122.116.1.noarch", "product_id": "kernel-devel-4.12.14-122.116.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-122.116.1.noarch", "product": { "name": "kernel-docs-4.12.14-122.116.1.noarch", "product_id": "kernel-docs-4.12.14-122.116.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-122.116.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-122.116.1.noarch", "product_id": "kernel-docs-html-4.12.14-122.116.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-122.116.1.noarch", "product": { "name": "kernel-macros-4.12.14-122.116.1.noarch", "product_id": "kernel-macros-4.12.14-122.116.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-122.116.1.noarch", "product": { "name": "kernel-source-4.12.14-122.116.1.noarch", "product_id": "kernel-source-4.12.14-122.116.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-122.116.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-122.116.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-122.116.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "product_id": "cluster-md-kmp-default-4.12.14-122.116.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-122.116.1.ppc64le", "product": { "name": "dlm-kmp-default-4.12.14-122.116.1.ppc64le", "product_id": "dlm-kmp-default-4.12.14-122.116.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "product_id": "gfs2-kmp-default-4.12.14-122.116.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-122.116.1.ppc64le", "product": { "name": "kernel-debug-4.12.14-122.116.1.ppc64le", "product_id": "kernel-debug-4.12.14-122.116.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-122.116.1.ppc64le", "product": { "name": "kernel-debug-base-4.12.14-122.116.1.ppc64le", "product_id": "kernel-debug-base-4.12.14-122.116.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-122.116.1.ppc64le", "product": { "name": "kernel-debug-devel-4.12.14-122.116.1.ppc64le", "product_id": "kernel-debug-devel-4.12.14-122.116.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-kgraft-devel-4.12.14-122.116.1.ppc64le", "product": { "name": "kernel-debug-kgraft-devel-4.12.14-122.116.1.ppc64le", "product_id": "kernel-debug-kgraft-devel-4.12.14-122.116.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.12.14-122.116.1.ppc64le", "product": { "name": "kernel-default-4.12.14-122.116.1.ppc64le", "product_id": "kernel-default-4.12.14-122.116.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-122.116.1.ppc64le", "product": { "name": "kernel-default-base-4.12.14-122.116.1.ppc64le", "product_id": "kernel-default-base-4.12.14-122.116.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-122.116.1.ppc64le", "product": { "name": "kernel-default-devel-4.12.14-122.116.1.ppc64le", "product_id": "kernel-default-devel-4.12.14-122.116.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-122.116.1.ppc64le", "product": { "name": "kernel-default-extra-4.12.14-122.116.1.ppc64le", "product_id": "kernel-default-extra-4.12.14-122.116.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "product": { "name": "kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "product_id": "kernel-default-kgraft-4.12.14-122.116.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "product": { "name": "kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "product_id": "kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-122.116.1.ppc64le", "product": { "name": "kernel-obs-build-4.12.14-122.116.1.ppc64le", "product_id": "kernel-obs-build-4.12.14-122.116.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-122.116.1.ppc64le", "product": { "name": "kernel-obs-qa-4.12.14-122.116.1.ppc64le", "product_id": "kernel-obs-qa-4.12.14-122.116.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-122.116.1.ppc64le", "product": { "name": "kernel-syms-4.12.14-122.116.1.ppc64le", "product_id": "kernel-syms-4.12.14-122.116.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-122.116.1.ppc64le", "product": { "name": "kernel-vanilla-4.12.14-122.116.1.ppc64le", "product_id": "kernel-vanilla-4.12.14-122.116.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-122.116.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.12.14-122.116.1.ppc64le", "product_id": "kernel-vanilla-base-4.12.14-122.116.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-122.116.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.12.14-122.116.1.ppc64le", "product_id": "kernel-vanilla-devel-4.12.14-122.116.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-122.116.1.ppc64le", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-122.116.1.ppc64le", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.116.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "product": { "name": "kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "product_id": "kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-122.116.1.ppc64le", "product": { "name": "kselftests-kmp-default-4.12.14-122.116.1.ppc64le", "product_id": "kselftests-kmp-default-4.12.14-122.116.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "product_id": "ocfs2-kmp-default-4.12.14-122.116.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-122.116.1.s390x", "product": { "name": "cluster-md-kmp-default-4.12.14-122.116.1.s390x", "product_id": "cluster-md-kmp-default-4.12.14-122.116.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-122.116.1.s390x", "product": { "name": "dlm-kmp-default-4.12.14-122.116.1.s390x", "product_id": "dlm-kmp-default-4.12.14-122.116.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-122.116.1.s390x", "product": { "name": "gfs2-kmp-default-4.12.14-122.116.1.s390x", "product_id": "gfs2-kmp-default-4.12.14-122.116.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.12.14-122.116.1.s390x", "product": { "name": "kernel-default-4.12.14-122.116.1.s390x", "product_id": "kernel-default-4.12.14-122.116.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-122.116.1.s390x", "product": { "name": "kernel-default-base-4.12.14-122.116.1.s390x", "product_id": "kernel-default-base-4.12.14-122.116.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-122.116.1.s390x", "product": { "name": "kernel-default-devel-4.12.14-122.116.1.s390x", "product_id": "kernel-default-devel-4.12.14-122.116.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-122.116.1.s390x", "product": { "name": "kernel-default-extra-4.12.14-122.116.1.s390x", "product_id": "kernel-default-extra-4.12.14-122.116.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-122.116.1.s390x", "product": { "name": "kernel-default-kgraft-4.12.14-122.116.1.s390x", "product_id": "kernel-default-kgraft-4.12.14-122.116.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "product": { "name": "kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "product_id": "kernel-default-kgraft-devel-4.12.14-122.116.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.12.14-122.116.1.s390x", "product": { "name": "kernel-default-man-4.12.14-122.116.1.s390x", "product_id": "kernel-default-man-4.12.14-122.116.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-122.116.1.s390x", "product": { "name": "kernel-obs-build-4.12.14-122.116.1.s390x", "product_id": "kernel-obs-build-4.12.14-122.116.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-122.116.1.s390x", "product": { "name": "kernel-obs-qa-4.12.14-122.116.1.s390x", "product_id": "kernel-obs-qa-4.12.14-122.116.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-122.116.1.s390x", "product": { "name": "kernel-syms-4.12.14-122.116.1.s390x", "product_id": "kernel-syms-4.12.14-122.116.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-122.116.1.s390x", "product": { "name": "kernel-vanilla-4.12.14-122.116.1.s390x", "product_id": "kernel-vanilla-4.12.14-122.116.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-122.116.1.s390x", "product": { "name": "kernel-vanilla-base-4.12.14-122.116.1.s390x", "product_id": "kernel-vanilla-base-4.12.14-122.116.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-122.116.1.s390x", "product": { "name": "kernel-vanilla-devel-4.12.14-122.116.1.s390x", "product_id": "kernel-vanilla-devel-4.12.14-122.116.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-122.116.1.s390x", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-122.116.1.s390x", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.116.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.12.14-122.116.1.s390x", "product": { "name": "kernel-zfcpdump-4.12.14-122.116.1.s390x", "product_id": "kernel-zfcpdump-4.12.14-122.116.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-man-4.12.14-122.116.1.s390x", "product": { "name": "kernel-zfcpdump-man-4.12.14-122.116.1.s390x", "product_id": "kernel-zfcpdump-man-4.12.14-122.116.1.s390x" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "product": { "name": "kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "product_id": "kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-122.116.1.s390x", "product": { "name": "kselftests-kmp-default-4.12.14-122.116.1.s390x", "product_id": "kselftests-kmp-default-4.12.14-122.116.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-122.116.1.s390x", "product": { "name": "ocfs2-kmp-default-4.12.14-122.116.1.s390x", "product_id": "ocfs2-kmp-default-4.12.14-122.116.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "product_id": "cluster-md-kmp-default-4.12.14-122.116.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-122.116.1.x86_64", "product": { "name": "dlm-kmp-default-4.12.14-122.116.1.x86_64", "product_id": "dlm-kmp-default-4.12.14-122.116.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-122.116.1.x86_64", "product": { "name": "gfs2-kmp-default-4.12.14-122.116.1.x86_64", "product_id": "gfs2-kmp-default-4.12.14-122.116.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-122.116.1.x86_64", "product": { "name": "kernel-debug-4.12.14-122.116.1.x86_64", "product_id": "kernel-debug-4.12.14-122.116.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-122.116.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-122.116.1.x86_64", "product_id": "kernel-debug-base-4.12.14-122.116.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-122.116.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-122.116.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-122.116.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-kgraft-devel-4.12.14-122.116.1.x86_64", "product": { "name": "kernel-debug-kgraft-devel-4.12.14-122.116.1.x86_64", "product_id": "kernel-debug-kgraft-devel-4.12.14-122.116.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-122.116.1.x86_64", "product": { "name": "kernel-default-4.12.14-122.116.1.x86_64", "product_id": "kernel-default-4.12.14-122.116.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-122.116.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-122.116.1.x86_64", "product_id": "kernel-default-base-4.12.14-122.116.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-122.116.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-122.116.1.x86_64", "product_id": "kernel-default-devel-4.12.14-122.116.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-122.116.1.x86_64", "product": { "name": "kernel-default-extra-4.12.14-122.116.1.x86_64", "product_id": "kernel-default-extra-4.12.14-122.116.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-122.116.1.x86_64", "product": { "name": "kernel-default-kgraft-4.12.14-122.116.1.x86_64", "product_id": "kernel-default-kgraft-4.12.14-122.116.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "product": { "name": "kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "product_id": "kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-122.116.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-122.116.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-122.116.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-122.116.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-122.116.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-122.116.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-122.116.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-122.116.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-122.116.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-kgraft-devel-4.12.14-122.116.1.x86_64", "product": { "name": "kernel-kvmsmall-kgraft-devel-4.12.14-122.116.1.x86_64", "product_id": "kernel-kvmsmall-kgraft-devel-4.12.14-122.116.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-122.116.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-122.116.1.x86_64", "product_id": "kernel-obs-build-4.12.14-122.116.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-122.116.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-122.116.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-122.116.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-122.116.1.x86_64", "product": { "name": "kernel-syms-4.12.14-122.116.1.x86_64", "product_id": "kernel-syms-4.12.14-122.116.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-122.116.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-122.116.1.x86_64", "product_id": "kernel-vanilla-4.12.14-122.116.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-122.116.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-122.116.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-122.116.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-122.116.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-122.116.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-122.116.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-122.116.1.x86_64", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-122.116.1.x86_64", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.116.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "product": { "name": "kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "product_id": "kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-122.116.1.x86_64", "product": { "name": "kselftests-kmp-default-4.12.14-122.116.1.x86_64", "product_id": "kselftests-kmp-default-4.12.14-122.116.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "product_id": "ocfs2-kmp-default-4.12.14-122.116.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 12 SP5", "product": { "name": "SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP5", "product": { "name": "SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 12 SP5", "product": { "name": "SUSE Linux Enterprise Workstation Extension 12 SP5", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-122.116.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-122.116.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.12.14-122.116.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-122.116.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-122.116.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.12.14-122.116.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-122.116.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.s390x" }, "product_reference": "dlm-kmp-default-4.12.14-122.116.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-122.116.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.x86_64" }, "product_reference": "dlm-kmp-default-4.12.14-122.116.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-122.116.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-122.116.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.s390x" }, "product_reference": "gfs2-kmp-default-4.12.14-122.116.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-122.116.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.12.14-122.116.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-122.116.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-122.116.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.12.14-122.116.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-122.116.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-122.116.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.ppc64le" }, "product_reference": "kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-122.116.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.s390x" }, "product_reference": "kernel-default-kgraft-4.12.14-122.116.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-122.116.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.x86_64" }, "product_reference": "kernel-default-kgraft-4.12.14-122.116.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-122.116.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.s390x" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-122.116.1.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.116.1.noarch" }, "product_reference": "kernel-docs-4.12.14-122.116.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-122.116.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-122.116.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-122.116.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.ppc64le" }, "product_reference": "kernel-obs-build-4.12.14-122.116.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-122.116.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.s390x" }, "product_reference": "kernel-obs-build-4.12.14-122.116.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-122.116.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-122.116.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.116.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.aarch64" }, "product_reference": "kernel-default-4.12.14-122.116.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.116.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-122.116.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.116.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.s390x" }, "product_reference": "kernel-default-4.12.14-122.116.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.116.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.x86_64" }, "product_reference": "kernel-default-4.12.14-122.116.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.116.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-122.116.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.116.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-122.116.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.116.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-122.116.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.116.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-122.116.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.116.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-122.116.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.116.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-122.116.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.116.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-122.116.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.116.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-122.116.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-122.116.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-122.116.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-122.116.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.116.1.noarch" }, "product_reference": "kernel-devel-4.12.14-122.116.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-122.116.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.116.1.noarch" }, "product_reference": "kernel-macros-4.12.14-122.116.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-122.116.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.116.1.noarch" }, "product_reference": "kernel-source-4.12.14-122.116.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.116.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-122.116.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.116.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-122.116.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.116.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.s390x" }, "product_reference": "kernel-syms-4.12.14-122.116.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.116.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-122.116.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.116.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.aarch64" }, "product_reference": "kernel-default-4.12.14-122.116.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.116.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-122.116.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.116.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.s390x" }, "product_reference": "kernel-default-4.12.14-122.116.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.116.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.x86_64" }, "product_reference": "kernel-default-4.12.14-122.116.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.116.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-122.116.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.116.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-122.116.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.116.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-122.116.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.116.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-122.116.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.116.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-122.116.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.116.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-122.116.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.116.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-122.116.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.116.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-122.116.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-122.116.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-122.116.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-122.116.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.116.1.noarch" }, "product_reference": "kernel-devel-4.12.14-122.116.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-122.116.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.116.1.noarch" }, "product_reference": "kernel-macros-4.12.14-122.116.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-122.116.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.116.1.noarch" }, "product_reference": "kernel-source-4.12.14-122.116.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.116.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-122.116.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.116.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-122.116.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.116.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.s390x" }, "product_reference": "kernel-syms-4.12.14-122.116.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.116.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-122.116.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-4.12.14-122.116.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP5", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.116.1.x86_64" }, "product_reference": "kernel-default-extra-4.12.14-122.116.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-39713", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-39713" } ], "notes": [ { "category": "general", "text": "Product: AndroidVersions: Android kernelAndroid ID: A-173788806References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.116.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-39713", "url": "https://www.suse.com/security/cve/CVE-2021-39713" }, { "category": "external", "summary": "SUSE Bug 1196973 for CVE-2021-39713", "url": "https://bugzilla.suse.com/1196973" }, { "category": "external", "summary": "SUSE Bug 1197211 for CVE-2021-39713", "url": "https://bugzilla.suse.com/1197211" }, { "category": "external", "summary": "SUSE Bug 1201790 for CVE-2021-39713", "url": "https://bugzilla.suse.com/1201790" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.116.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.116.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-14T06:56:48Z", "details": "important" } ], "title": "CVE-2021-39713" }, { "cve": "CVE-2021-45868", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-45868" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.15.3, fs/quota/quota_tree.c does not validate the block number in the quota tree (on disk). This can, for example, lead to a kernel/locking/rwsem.c use-after-free if there is a corrupted quota file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.116.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-45868", "url": "https://www.suse.com/security/cve/CVE-2021-45868" }, { "category": "external", "summary": "SUSE Bug 1197366 for CVE-2021-45868", "url": "https://bugzilla.suse.com/1197366" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.116.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.116.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-14T06:56:48Z", "details": "moderate" } ], "title": "CVE-2021-45868" }, { "cve": "CVE-2022-0001", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0001" } ], "notes": [ { "category": "general", "text": "Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.116.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0001", "url": "https://www.suse.com/security/cve/CVE-2022-0001" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2022-0001", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2022-0001", "url": "https://bugzilla.suse.com/1196901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.116.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.116.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-14T06:56:48Z", "details": "moderate" } ], "title": "CVE-2022-0001" }, { "cve": "CVE-2022-0002", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0002" } ], "notes": [ { "category": "general", "text": "Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.116.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0002", "url": "https://www.suse.com/security/cve/CVE-2022-0002" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2022-0002", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2022-0002", "url": "https://bugzilla.suse.com/1196901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.116.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.116.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-14T06:56:48Z", "details": "moderate" } ], "title": "CVE-2022-0002" }, { "cve": "CVE-2022-0812", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0812" } ], "notes": [ { "category": "general", "text": "An information leak flaw was found in NFS over RDMA in the net/sunrpc/xprtrdma/rpc_rdma.c in the Linux Kernel. This flaw allows an attacker with normal user privileges to leak kernel information.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.116.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0812", "url": "https://www.suse.com/security/cve/CVE-2022-0812" }, { "category": "external", "summary": "SUSE Bug 1196639 for CVE-2022-0812", "url": "https://bugzilla.suse.com/1196639" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.116.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.116.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-14T06:56:48Z", "details": "moderate" } ], "title": "CVE-2022-0812" }, { "cve": "CVE-2022-0850", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0850" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in linux kernel, where an information leak occurs via ext4_extent_header to userspace.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.116.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0850", "url": "https://www.suse.com/security/cve/CVE-2022-0850" }, { "category": "external", "summary": "SUSE Bug 1196761 for CVE-2022-0850", "url": "https://bugzilla.suse.com/1196761" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.116.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.116.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-14T06:56:48Z", "details": "moderate" } ], "title": "CVE-2022-0850" }, { "cve": "CVE-2022-1016", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1016" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in net/netfilter/nf_tables_core.c:nft_do_chain, which can cause a use-after-free. This issue needs to handle \u0027return\u0027 with proper preconditions, as it can lead to a kernel information leak problem caused by a local, unprivileged attacker.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.116.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1016", "url": "https://www.suse.com/security/cve/CVE-2022-1016" }, { "category": "external", "summary": "SUSE Bug 1197335 for CVE-2022-1016", "url": "https://bugzilla.suse.com/1197335" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.116.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.116.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-14T06:56:48Z", "details": "important" } ], "title": "CVE-2022-1016" }, { "cve": "CVE-2022-1048", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1048" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in the Linux kernel\u0027s sound subsystem in the way a user triggers concurrent calls of PCM hw_params. The hw_free ioctls or similar race condition happens inside ALSA PCM for other ioctls. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.116.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1048", "url": "https://www.suse.com/security/cve/CVE-2022-1048" }, { "category": "external", "summary": "SUSE Bug 1197331 for CVE-2022-1048", "url": "https://bugzilla.suse.com/1197331" }, { "category": "external", "summary": "SUSE Bug 1197597 for CVE-2022-1048", "url": "https://bugzilla.suse.com/1197597" }, { "category": "external", "summary": "SUSE Bug 1200041 for CVE-2022-1048", "url": "https://bugzilla.suse.com/1200041" }, { "category": "external", "summary": "SUSE Bug 1204132 for CVE-2022-1048", "url": "https://bugzilla.suse.com/1204132" }, { "category": "external", "summary": "SUSE Bug 1212325 for CVE-2022-1048", "url": "https://bugzilla.suse.com/1212325" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.116.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.116.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-14T06:56:48Z", "details": "important" } ], "title": "CVE-2022-1048" }, { "cve": "CVE-2022-23036", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23036" } ], "notes": [ { "category": "general", "text": "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn\u0027t check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.116.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23036", "url": "https://www.suse.com/security/cve/CVE-2022-23036" }, { "category": "external", "summary": "SUSE Bug 1196488 for CVE-2022-23036", "url": "https://bugzilla.suse.com/1196488" }, { "category": "external", "summary": "SUSE Bug 1199099 for CVE-2022-23036", "url": "https://bugzilla.suse.com/1199099" }, { "category": "external", "summary": "SUSE Bug 1199141 for CVE-2022-23036", "url": "https://bugzilla.suse.com/1199141" }, { "category": "external", "summary": "SUSE Bug 1204132 for CVE-2022-23036", "url": "https://bugzilla.suse.com/1204132" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.116.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.116.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-14T06:56:48Z", "details": "important" } ], "title": "CVE-2022-23036" }, { "cve": "CVE-2022-23037", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23037" } ], "notes": [ { "category": "general", "text": "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn\u0027t check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.116.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23037", "url": "https://www.suse.com/security/cve/CVE-2022-23037" }, { "category": "external", "summary": "SUSE Bug 1199099 for CVE-2022-23037", "url": "https://bugzilla.suse.com/1199099" }, { "category": "external", "summary": "SUSE Bug 1199141 for CVE-2022-23037", "url": "https://bugzilla.suse.com/1199141" }, { "category": "external", "summary": "SUSE Bug 1204132 for CVE-2022-23037", "url": "https://bugzilla.suse.com/1204132" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.116.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.116.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-14T06:56:48Z", "details": "important" } ], "title": "CVE-2022-23037" }, { "cve": "CVE-2022-23038", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23038" } ], "notes": [ { "category": "general", "text": "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn\u0027t check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.116.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23038", "url": "https://www.suse.com/security/cve/CVE-2022-23038" }, { "category": "external", "summary": "SUSE Bug 1199099 for CVE-2022-23038", "url": "https://bugzilla.suse.com/1199099" }, { "category": "external", "summary": "SUSE Bug 1199141 for CVE-2022-23038", "url": "https://bugzilla.suse.com/1199141" }, { "category": "external", "summary": "SUSE Bug 1204132 for CVE-2022-23038", "url": "https://bugzilla.suse.com/1204132" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.116.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.116.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-14T06:56:48Z", "details": "important" } ], "title": "CVE-2022-23038" }, { "cve": "CVE-2022-23039", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23039" } ], "notes": [ { "category": "general", "text": "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn\u0027t check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.116.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23039", "url": "https://www.suse.com/security/cve/CVE-2022-23039" }, { "category": "external", "summary": "SUSE Bug 1199099 for CVE-2022-23039", "url": "https://bugzilla.suse.com/1199099" }, { "category": "external", "summary": "SUSE Bug 1199141 for CVE-2022-23039", "url": "https://bugzilla.suse.com/1199141" }, { "category": "external", "summary": "SUSE Bug 1204132 for CVE-2022-23039", "url": "https://bugzilla.suse.com/1204132" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.116.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.116.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-14T06:56:48Z", "details": "important" } ], "title": "CVE-2022-23039" }, { "cve": "CVE-2022-23040", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23040" } ], "notes": [ { "category": "general", "text": "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn\u0027t check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.116.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23040", "url": "https://www.suse.com/security/cve/CVE-2022-23040" }, { "category": "external", "summary": "SUSE Bug 1199099 for CVE-2022-23040", "url": "https://bugzilla.suse.com/1199099" }, { "category": "external", "summary": "SUSE Bug 1199141 for CVE-2022-23040", "url": "https://bugzilla.suse.com/1199141" }, { "category": "external", "summary": "SUSE Bug 1204132 for CVE-2022-23040", "url": "https://bugzilla.suse.com/1204132" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.116.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.116.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-14T06:56:48Z", "details": "important" } ], "title": "CVE-2022-23040" }, { "cve": "CVE-2022-23041", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23041" } ], "notes": [ { "category": "general", "text": "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn\u0027t check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.116.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23041", "url": "https://www.suse.com/security/cve/CVE-2022-23041" }, { "category": "external", "summary": "SUSE Bug 1199099 for CVE-2022-23041", "url": "https://bugzilla.suse.com/1199099" }, { "category": "external", "summary": "SUSE Bug 1199141 for CVE-2022-23041", "url": "https://bugzilla.suse.com/1199141" }, { "category": "external", "summary": "SUSE Bug 1204132 for CVE-2022-23041", "url": "https://bugzilla.suse.com/1204132" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.116.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.116.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-14T06:56:48Z", "details": "important" } ], "title": "CVE-2022-23041" }, { "cve": "CVE-2022-23042", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23042" } ], "notes": [ { "category": "general", "text": "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn\u0027t check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.116.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23042", "url": "https://www.suse.com/security/cve/CVE-2022-23042" }, { "category": "external", "summary": "SUSE Bug 1199099 for CVE-2022-23042", "url": "https://bugzilla.suse.com/1199099" }, { "category": "external", "summary": "SUSE Bug 1199141 for CVE-2022-23042", "url": "https://bugzilla.suse.com/1199141" }, { "category": "external", "summary": "SUSE Bug 1204132 for CVE-2022-23042", "url": "https://bugzilla.suse.com/1204132" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.116.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.116.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-14T06:56:48Z", "details": "important" } ], "title": "CVE-2022-23042" }, { "cve": "CVE-2022-23960", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23960" } ], "notes": [ { "category": "general", "text": "Certain Arm Cortex and Neoverse processors through 2022-03-08 do not properly restrict cache speculation, aka Spectre-BHB. An attacker can leverage the shared branch history in the Branch History Buffer (BHB) to influence mispredicted branches. Then, cache allocation can allow the attacker to obtain sensitive information.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.116.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23960", "url": "https://www.suse.com/security/cve/CVE-2022-23960" }, { "category": "external", "summary": "SUSE Bug 1196657 for CVE-2022-23960", "url": "https://bugzilla.suse.com/1196657" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2022-23960", "url": "https://bugzilla.suse.com/1196901" }, { "category": "external", "summary": "SUSE Bug 1198228 for CVE-2022-23960", "url": "https://bugzilla.suse.com/1198228" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.116.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.116.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-14T06:56:48Z", "details": "moderate" } ], "title": "CVE-2022-23960" }, { "cve": "CVE-2022-26490", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-26490" } ], "notes": [ { "category": "general", "text": "st21nfca_connectivity_event_received in drivers/nfc/st21nfca/se.c in the Linux kernel through 5.16.12 has EVT_TRANSACTION buffer overflows because of untrusted length parameters.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.116.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-26490", "url": "https://www.suse.com/security/cve/CVE-2022-26490" }, { "category": "external", "summary": "SUSE Bug 1196830 for CVE-2022-26490", "url": "https://bugzilla.suse.com/1196830" }, { "category": "external", "summary": "SUSE Bug 1201656 for CVE-2022-26490", "url": "https://bugzilla.suse.com/1201656" }, { "category": "external", "summary": "SUSE Bug 1201969 for CVE-2022-26490", "url": "https://bugzilla.suse.com/1201969" }, { "category": "external", "summary": "SUSE Bug 1211495 for CVE-2022-26490", "url": "https://bugzilla.suse.com/1211495" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.116.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.116.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-14T06:56:48Z", "details": "important" } ], "title": "CVE-2022-26490" }, { "cve": "CVE-2022-26966", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-26966" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.16.12. drivers/net/usb/sr9700.c allows attackers to obtain sensitive information from heap memory via crafted frame lengths from a device.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.116.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-26966", "url": "https://www.suse.com/security/cve/CVE-2022-26966" }, { "category": "external", "summary": "SUSE Bug 1196836 for CVE-2022-26966", "url": "https://bugzilla.suse.com/1196836" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.116.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.116.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-14T06:56:48Z", "details": "moderate" } ], "title": "CVE-2022-26966" }, { "cve": "CVE-2022-27666", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-27666" } ], "notes": [ { "category": "general", "text": "A heap buffer overflow flaw was found in IPsec ESP transformation code in net/ipv4/esp4.c and net/ipv6/esp6.c. This flaw allows a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation threat.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.116.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-27666", "url": "https://www.suse.com/security/cve/CVE-2022-27666" }, { "category": "external", "summary": "SUSE Bug 1197131 for CVE-2022-27666", "url": "https://bugzilla.suse.com/1197131" }, { "category": "external", "summary": "SUSE Bug 1197133 for CVE-2022-27666", "url": "https://bugzilla.suse.com/1197133" }, { "category": "external", "summary": "SUSE Bug 1197462 for CVE-2022-27666", "url": "https://bugzilla.suse.com/1197462" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.116.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.116.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-14T06:56:48Z", "details": "important" } ], "title": "CVE-2022-27666" }, { "cve": "CVE-2022-28388", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-28388" } ], "notes": [ { "category": "general", "text": "usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c in the Linux kernel through 5.17.1 has a double free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.116.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-28388", "url": "https://www.suse.com/security/cve/CVE-2022-28388" }, { "category": "external", "summary": "SUSE Bug 1198032 for CVE-2022-28388", "url": "https://bugzilla.suse.com/1198032" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.116.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.116.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-14T06:56:48Z", "details": "moderate" } ], "title": "CVE-2022-28388" }, { "cve": "CVE-2022-28389", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-28389" } ], "notes": [ { "category": "general", "text": "mcba_usb_start_xmit in drivers/net/can/usb/mcba_usb.c in the Linux kernel through 5.17.1 has a double free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.116.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-28389", "url": "https://www.suse.com/security/cve/CVE-2022-28389" }, { "category": "external", "summary": "SUSE Bug 1198033 for CVE-2022-28389", "url": "https://bugzilla.suse.com/1198033" }, { "category": "external", "summary": "SUSE Bug 1201657 for CVE-2022-28389", "url": "https://bugzilla.suse.com/1201657" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.116.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.116.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-14T06:56:48Z", "details": "moderate" } ], "title": "CVE-2022-28389" }, { "cve": "CVE-2022-28390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-28390" } ], "notes": [ { "category": "general", "text": "ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c in the Linux kernel through 5.17.1 has a double free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.116.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-28390", "url": "https://www.suse.com/security/cve/CVE-2022-28390" }, { "category": "external", "summary": "SUSE Bug 1198031 for CVE-2022-28390", "url": "https://bugzilla.suse.com/1198031" }, { "category": "external", "summary": "SUSE Bug 1201517 for CVE-2022-28390", "url": "https://bugzilla.suse.com/1201517" }, { "category": "external", "summary": "SUSE Bug 1207969 for CVE-2022-28390", "url": "https://bugzilla.suse.com/1207969" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.116.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_116-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.116.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.116.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.116.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-14T06:56:48Z", "details": "moderate" } ], "title": "CVE-2022-28390" } ] }
suse-su-2022:0931-1
Vulnerability from csaf_suse
Published
2022-03-22 10:10
Modified
2022-03-22 10:10
Summary
Security update for xen
Notes
Title of the patch
Security update for xen
Description of the patch
This update for xen fixes the following issues:
Transient execution side-channel attacks attacking the Branch History Buffer (BHB),
named 'Branch Target Injection' and 'Intra-Mode Branch History Injection' are now mitigated.
- CVE-2022-0001, CVE-2022-0002, CVE-2021-26401: BHB speculation issues (bsc#1196915).
Patchnames
SUSE-2022-931,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-931,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-931,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-931,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-931,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-931,SUSE-Storage-6-2022-931
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "This update for xen fixes the following issues:\n\nTransient execution side-channel attacks attacking the Branch History Buffer (BHB),\nnamed \u0027Branch Target Injection\u0027 and \u0027Intra-Mode Branch History Injection\u0027 are now mitigated.\n\n- CVE-2022-0001, CVE-2022-0002, CVE-2021-26401: BHB speculation issues (bsc#1196915).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-931,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-931,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-931,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-931,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-931,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-931,SUSE-Storage-6-2022-931", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0931-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:0931-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220931-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:0931-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010501.html" }, { "category": "self", "summary": "SUSE Bug 1196915", "url": "https://bugzilla.suse.com/1196915" }, { "category": "self", "summary": "SUSE CVE CVE-2021-26401 page", "url": "https://www.suse.com/security/cve/CVE-2021-26401/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0001 page", "url": "https://www.suse.com/security/cve/CVE-2022-0001/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0002 page", "url": "https://www.suse.com/security/cve/CVE-2022-0002/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2022-03-22T10:10:49Z", "generator": { "date": "2022-03-22T10:10:49Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:0931-1", "initial_release_date": "2022-03-22T10:10:49Z", "revision_history": [ { "date": "2022-03-22T10:10:49Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-4.12.4_20-3.63.1.aarch64", "product": { "name": "xen-4.12.4_20-3.63.1.aarch64", "product_id": "xen-4.12.4_20-3.63.1.aarch64" } }, { "category": "product_version", "name": "xen-devel-4.12.4_20-3.63.1.aarch64", "product": { "name": "xen-devel-4.12.4_20-3.63.1.aarch64", "product_id": "xen-devel-4.12.4_20-3.63.1.aarch64" } }, { "category": "product_version", "name": "xen-doc-html-4.12.4_20-3.63.1.aarch64", "product": { "name": "xen-doc-html-4.12.4_20-3.63.1.aarch64", "product_id": "xen-doc-html-4.12.4_20-3.63.1.aarch64" } }, { "category": "product_version", "name": "xen-libs-4.12.4_20-3.63.1.aarch64", "product": { "name": "xen-libs-4.12.4_20-3.63.1.aarch64", "product_id": "xen-libs-4.12.4_20-3.63.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-4.12.4_20-3.63.1.aarch64", "product": { "name": "xen-tools-4.12.4_20-3.63.1.aarch64", "product_id": "xen-tools-4.12.4_20-3.63.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-domU-4.12.4_20-3.63.1.aarch64", "product": { "name": "xen-tools-domU-4.12.4_20-3.63.1.aarch64", "product_id": "xen-tools-domU-4.12.4_20-3.63.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "xen-libs-64bit-4.12.4_20-3.63.1.aarch64_ilp32", "product": { "name": "xen-libs-64bit-4.12.4_20-3.63.1.aarch64_ilp32", "product_id": "xen-libs-64bit-4.12.4_20-3.63.1.aarch64_ilp32" } } ], "category": "architecture", "name": "aarch64_ilp32" }, { "branches": [ { "category": "product_version", "name": "xen-devel-4.12.4_20-3.63.1.i586", "product": { "name": "xen-devel-4.12.4_20-3.63.1.i586", "product_id": "xen-devel-4.12.4_20-3.63.1.i586" } }, { "category": "product_version", "name": "xen-libs-4.12.4_20-3.63.1.i586", "product": { "name": "xen-libs-4.12.4_20-3.63.1.i586", "product_id": "xen-libs-4.12.4_20-3.63.1.i586" } }, { "category": "product_version", "name": "xen-tools-domU-4.12.4_20-3.63.1.i586", "product": { "name": "xen-tools-domU-4.12.4_20-3.63.1.i586", "product_id": "xen-tools-domU-4.12.4_20-3.63.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "xen-4.12.4_20-3.63.1.x86_64", "product": { "name": "xen-4.12.4_20-3.63.1.x86_64", "product_id": "xen-4.12.4_20-3.63.1.x86_64" } }, { "category": "product_version", "name": "xen-devel-4.12.4_20-3.63.1.x86_64", "product": { "name": "xen-devel-4.12.4_20-3.63.1.x86_64", "product_id": "xen-devel-4.12.4_20-3.63.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.12.4_20-3.63.1.x86_64", "product": { "name": "xen-doc-html-4.12.4_20-3.63.1.x86_64", "product_id": "xen-doc-html-4.12.4_20-3.63.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.12.4_20-3.63.1.x86_64", "product": { "name": "xen-libs-4.12.4_20-3.63.1.x86_64", "product_id": "xen-libs-4.12.4_20-3.63.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.12.4_20-3.63.1.x86_64", "product": { "name": "xen-libs-32bit-4.12.4_20-3.63.1.x86_64", "product_id": "xen-libs-32bit-4.12.4_20-3.63.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.12.4_20-3.63.1.x86_64", "product": { "name": "xen-tools-4.12.4_20-3.63.1.x86_64", "product_id": "xen-tools-4.12.4_20-3.63.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.12.4_20-3.63.1.x86_64", "product": { "name": "xen-tools-domU-4.12.4_20-3.63.1.x86_64", "product_id": "xen-tools-domU-4.12.4_20-3.63.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP1-BCL", "product": { "name": "SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_bcl:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp1" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 6", "product": { "name": "SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:6" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-4.12.4_20-3.63.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:xen-4.12.4_20-3.63.1.x86_64" }, "product_reference": "xen-4.12.4_20-3.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.12.4_20-3.63.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:xen-devel-4.12.4_20-3.63.1.x86_64" }, "product_reference": "xen-devel-4.12.4_20-3.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.12.4_20-3.63.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:xen-libs-4.12.4_20-3.63.1.x86_64" }, "product_reference": "xen-libs-4.12.4_20-3.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.12.4_20-3.63.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:xen-tools-4.12.4_20-3.63.1.x86_64" }, "product_reference": "xen-tools-4.12.4_20-3.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.12.4_20-3.63.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:xen-tools-domU-4.12.4_20-3.63.1.x86_64" }, "product_reference": "xen-tools-domU-4.12.4_20-3.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.12.4_20-3.63.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-4.12.4_20-3.63.1.x86_64" }, "product_reference": "xen-4.12.4_20-3.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.12.4_20-3.63.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-devel-4.12.4_20-3.63.1.x86_64" }, "product_reference": "xen-devel-4.12.4_20-3.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.12.4_20-3.63.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-libs-4.12.4_20-3.63.1.x86_64" }, "product_reference": "xen-libs-4.12.4_20-3.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.12.4_20-3.63.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-tools-4.12.4_20-3.63.1.x86_64" }, "product_reference": "xen-tools-4.12.4_20-3.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.12.4_20-3.63.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-tools-domU-4.12.4_20-3.63.1.x86_64" }, "product_reference": "xen-tools-domU-4.12.4_20-3.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.12.4_20-3.63.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:xen-4.12.4_20-3.63.1.x86_64" }, "product_reference": "xen-4.12.4_20-3.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.12.4_20-3.63.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:xen-devel-4.12.4_20-3.63.1.x86_64" }, "product_reference": "xen-devel-4.12.4_20-3.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.12.4_20-3.63.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:xen-libs-4.12.4_20-3.63.1.x86_64" }, "product_reference": "xen-libs-4.12.4_20-3.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.12.4_20-3.63.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:xen-tools-4.12.4_20-3.63.1.x86_64" }, "product_reference": "xen-tools-4.12.4_20-3.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.12.4_20-3.63.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:xen-tools-domU-4.12.4_20-3.63.1.x86_64" }, "product_reference": "xen-tools-domU-4.12.4_20-3.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.12.4_20-3.63.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-4.12.4_20-3.63.1.x86_64" }, "product_reference": "xen-4.12.4_20-3.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.12.4_20-3.63.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-devel-4.12.4_20-3.63.1.x86_64" }, "product_reference": "xen-devel-4.12.4_20-3.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.12.4_20-3.63.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-libs-4.12.4_20-3.63.1.x86_64" }, "product_reference": "xen-libs-4.12.4_20-3.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.12.4_20-3.63.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-tools-4.12.4_20-3.63.1.x86_64" }, "product_reference": "xen-tools-4.12.4_20-3.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.12.4_20-3.63.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-tools-domU-4.12.4_20-3.63.1.x86_64" }, "product_reference": "xen-tools-domU-4.12.4_20-3.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.12.4_20-3.63.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-4.12.4_20-3.63.1.x86_64" }, "product_reference": "xen-4.12.4_20-3.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.12.4_20-3.63.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-devel-4.12.4_20-3.63.1.x86_64" }, "product_reference": "xen-devel-4.12.4_20-3.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.12.4_20-3.63.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-libs-4.12.4_20-3.63.1.x86_64" }, "product_reference": "xen-libs-4.12.4_20-3.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.12.4_20-3.63.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-tools-4.12.4_20-3.63.1.x86_64" }, "product_reference": "xen-tools-4.12.4_20-3.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.12.4_20-3.63.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-tools-domU-4.12.4_20-3.63.1.x86_64" }, "product_reference": "xen-tools-domU-4.12.4_20-3.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.12.4_20-3.63.1.x86_64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:xen-4.12.4_20-3.63.1.x86_64" }, "product_reference": "xen-4.12.4_20-3.63.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.12.4_20-3.63.1.x86_64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:xen-devel-4.12.4_20-3.63.1.x86_64" }, "product_reference": "xen-devel-4.12.4_20-3.63.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.12.4_20-3.63.1.x86_64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:xen-libs-4.12.4_20-3.63.1.x86_64" }, "product_reference": "xen-libs-4.12.4_20-3.63.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.12.4_20-3.63.1.x86_64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:xen-tools-4.12.4_20-3.63.1.x86_64" }, "product_reference": "xen-tools-4.12.4_20-3.63.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.12.4_20-3.63.1.x86_64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:xen-tools-domU-4.12.4_20-3.63.1.x86_64" }, "product_reference": "xen-tools-domU-4.12.4_20-3.63.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 6" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-26401", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-26401" } ], "notes": [ { "category": "general", "text": "LFENCE/JMP (mitigation V2-2) may not sufficiently mitigate CVE-2017-5715 on some AMD CPUs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:xen-4.12.4_20-3.63.1.x86_64", "SUSE Enterprise Storage 6:xen-devel-4.12.4_20-3.63.1.x86_64", "SUSE Enterprise Storage 6:xen-libs-4.12.4_20-3.63.1.x86_64", "SUSE Enterprise Storage 6:xen-tools-4.12.4_20-3.63.1.x86_64", "SUSE Enterprise Storage 6:xen-tools-domU-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:xen-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:xen-devel-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:xen-libs-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:xen-tools-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:xen-tools-domU-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-devel-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-libs-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-tools-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-tools-domU-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:xen-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:xen-devel-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:xen-libs-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:xen-tools-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:xen-tools-domU-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-devel-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-libs-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-tools-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-tools-domU-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-devel-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-libs-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-tools-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-tools-domU-4.12.4_20-3.63.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-26401", "url": "https://www.suse.com/security/cve/CVE-2021-26401" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2021-26401", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2021-26401", "url": "https://bugzilla.suse.com/1196901" }, { "category": "external", "summary": "SUSE Bug 1209630 for CVE-2021-26401", "url": "https://bugzilla.suse.com/1209630" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:xen-4.12.4_20-3.63.1.x86_64", "SUSE Enterprise Storage 6:xen-devel-4.12.4_20-3.63.1.x86_64", "SUSE Enterprise Storage 6:xen-libs-4.12.4_20-3.63.1.x86_64", "SUSE Enterprise Storage 6:xen-tools-4.12.4_20-3.63.1.x86_64", "SUSE Enterprise Storage 6:xen-tools-domU-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:xen-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:xen-devel-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:xen-libs-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:xen-tools-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:xen-tools-domU-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-devel-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-libs-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-tools-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-tools-domU-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:xen-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:xen-devel-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:xen-libs-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:xen-tools-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:xen-tools-domU-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-devel-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-libs-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-tools-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-tools-domU-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-devel-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-libs-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-tools-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-tools-domU-4.12.4_20-3.63.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:xen-4.12.4_20-3.63.1.x86_64", "SUSE Enterprise Storage 6:xen-devel-4.12.4_20-3.63.1.x86_64", "SUSE Enterprise Storage 6:xen-libs-4.12.4_20-3.63.1.x86_64", "SUSE Enterprise Storage 6:xen-tools-4.12.4_20-3.63.1.x86_64", "SUSE Enterprise Storage 6:xen-tools-domU-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:xen-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:xen-devel-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:xen-libs-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:xen-tools-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:xen-tools-domU-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-devel-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-libs-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-tools-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-tools-domU-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:xen-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:xen-devel-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:xen-libs-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:xen-tools-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:xen-tools-domU-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-devel-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-libs-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-tools-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-tools-domU-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-devel-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-libs-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-tools-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-tools-domU-4.12.4_20-3.63.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-22T10:10:49Z", "details": "moderate" } ], "title": "CVE-2021-26401" }, { "cve": "CVE-2022-0001", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0001" } ], "notes": [ { "category": "general", "text": "Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:xen-4.12.4_20-3.63.1.x86_64", "SUSE Enterprise Storage 6:xen-devel-4.12.4_20-3.63.1.x86_64", "SUSE Enterprise Storage 6:xen-libs-4.12.4_20-3.63.1.x86_64", "SUSE Enterprise Storage 6:xen-tools-4.12.4_20-3.63.1.x86_64", "SUSE Enterprise Storage 6:xen-tools-domU-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:xen-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:xen-devel-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:xen-libs-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:xen-tools-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:xen-tools-domU-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-devel-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-libs-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-tools-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-tools-domU-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:xen-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:xen-devel-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:xen-libs-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:xen-tools-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:xen-tools-domU-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-devel-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-libs-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-tools-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-tools-domU-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-devel-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-libs-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-tools-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-tools-domU-4.12.4_20-3.63.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0001", "url": "https://www.suse.com/security/cve/CVE-2022-0001" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2022-0001", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2022-0001", "url": "https://bugzilla.suse.com/1196901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:xen-4.12.4_20-3.63.1.x86_64", "SUSE Enterprise Storage 6:xen-devel-4.12.4_20-3.63.1.x86_64", "SUSE Enterprise Storage 6:xen-libs-4.12.4_20-3.63.1.x86_64", "SUSE Enterprise Storage 6:xen-tools-4.12.4_20-3.63.1.x86_64", "SUSE Enterprise Storage 6:xen-tools-domU-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:xen-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:xen-devel-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:xen-libs-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:xen-tools-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:xen-tools-domU-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-devel-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-libs-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-tools-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-tools-domU-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:xen-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:xen-devel-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:xen-libs-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:xen-tools-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:xen-tools-domU-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-devel-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-libs-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-tools-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-tools-domU-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-devel-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-libs-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-tools-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-tools-domU-4.12.4_20-3.63.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:xen-4.12.4_20-3.63.1.x86_64", "SUSE Enterprise Storage 6:xen-devel-4.12.4_20-3.63.1.x86_64", "SUSE Enterprise Storage 6:xen-libs-4.12.4_20-3.63.1.x86_64", "SUSE Enterprise Storage 6:xen-tools-4.12.4_20-3.63.1.x86_64", "SUSE Enterprise Storage 6:xen-tools-domU-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:xen-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:xen-devel-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:xen-libs-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:xen-tools-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:xen-tools-domU-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-devel-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-libs-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-tools-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-tools-domU-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:xen-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:xen-devel-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:xen-libs-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:xen-tools-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:xen-tools-domU-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-devel-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-libs-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-tools-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-tools-domU-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-devel-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-libs-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-tools-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-tools-domU-4.12.4_20-3.63.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-22T10:10:49Z", "details": "moderate" } ], "title": "CVE-2022-0001" }, { "cve": "CVE-2022-0002", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0002" } ], "notes": [ { "category": "general", "text": "Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:xen-4.12.4_20-3.63.1.x86_64", "SUSE Enterprise Storage 6:xen-devel-4.12.4_20-3.63.1.x86_64", "SUSE Enterprise Storage 6:xen-libs-4.12.4_20-3.63.1.x86_64", "SUSE Enterprise Storage 6:xen-tools-4.12.4_20-3.63.1.x86_64", "SUSE Enterprise Storage 6:xen-tools-domU-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:xen-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:xen-devel-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:xen-libs-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:xen-tools-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:xen-tools-domU-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-devel-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-libs-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-tools-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-tools-domU-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:xen-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:xen-devel-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:xen-libs-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:xen-tools-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:xen-tools-domU-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-devel-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-libs-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-tools-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-tools-domU-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-devel-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-libs-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-tools-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-tools-domU-4.12.4_20-3.63.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0002", "url": "https://www.suse.com/security/cve/CVE-2022-0002" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2022-0002", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2022-0002", "url": "https://bugzilla.suse.com/1196901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:xen-4.12.4_20-3.63.1.x86_64", "SUSE Enterprise Storage 6:xen-devel-4.12.4_20-3.63.1.x86_64", "SUSE Enterprise Storage 6:xen-libs-4.12.4_20-3.63.1.x86_64", "SUSE Enterprise Storage 6:xen-tools-4.12.4_20-3.63.1.x86_64", "SUSE Enterprise Storage 6:xen-tools-domU-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:xen-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:xen-devel-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:xen-libs-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:xen-tools-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:xen-tools-domU-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-devel-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-libs-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-tools-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-tools-domU-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:xen-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:xen-devel-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:xen-libs-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:xen-tools-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:xen-tools-domU-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-devel-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-libs-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-tools-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-tools-domU-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-devel-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-libs-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-tools-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-tools-domU-4.12.4_20-3.63.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:xen-4.12.4_20-3.63.1.x86_64", "SUSE Enterprise Storage 6:xen-devel-4.12.4_20-3.63.1.x86_64", "SUSE Enterprise Storage 6:xen-libs-4.12.4_20-3.63.1.x86_64", "SUSE Enterprise Storage 6:xen-tools-4.12.4_20-3.63.1.x86_64", "SUSE Enterprise Storage 6:xen-tools-domU-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:xen-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:xen-devel-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:xen-libs-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:xen-tools-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:xen-tools-domU-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-devel-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-libs-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-tools-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-tools-domU-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:xen-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:xen-devel-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:xen-libs-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:xen-tools-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:xen-tools-domU-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-devel-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-libs-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-tools-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-tools-domU-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-devel-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-libs-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-tools-4.12.4_20-3.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-tools-domU-4.12.4_20-3.63.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-22T10:10:49Z", "details": "moderate" } ], "title": "CVE-2022-0002" } ] }
suse-su-2022:1375-1
Vulnerability from csaf_suse
Published
2022-04-25 13:40
Modified
2022-04-25 13:40
Summary
Security update for xen
Notes
Title of the patch
Security update for xen
Description of the patch
This update for xen fixes the following issues:
- CVE-2022-26356: Fixed potential race conditions in dirty memory tracking that
could cause a denial of service in the host (bsc#1197423).
- CVE-2022-26357: Fixed a potential race condition in memory cleanup for hosts
using VT-d IOMMU hardware, which could lead to a denial of service in the host
(bsc#1197425).
- CVE-2022-26358,CVE-2022-26359,CVE-2022-26360,CVE-2022-26361: Fixed various memory
corruption issues for hosts using VT-d or AMD-Vi IOMMU hardware. These could be
leveraged by an attacker to cause a denial of service in the host (bsc#1197426).
- CVE-2022-0001, CVE-2022-0002, CVE-2021-26401: Added BHB speculation issue
mitigations (bsc#1196915).
- CVE-2021-20257: Fixed an infinite loop in the e1000 emulated device, which
could cause an excessive CPU consumption in the host (bsc#1182846).
Patchnames
SUSE-2022-1375,SUSE-SLE-SERVER-12-SP2-BCL-2022-1375
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "This update for xen fixes the following issues:\n\n- CVE-2022-26356: Fixed potential race conditions in dirty memory tracking that\n could cause a denial of service in the host (bsc#1197423).\n- CVE-2022-26357: Fixed a potential race condition in memory cleanup for hosts\n using VT-d IOMMU hardware, which could lead to a denial of service in the host\n (bsc#1197425).\n- CVE-2022-26358,CVE-2022-26359,CVE-2022-26360,CVE-2022-26361: Fixed various memory\n corruption issues for hosts using VT-d or AMD-Vi IOMMU hardware. These could be\n leveraged by an attacker to cause a denial of service in the host (bsc#1197426).\n- CVE-2022-0001, CVE-2022-0002, CVE-2021-26401: Added BHB speculation issue\n mitigations (bsc#1196915).\n- CVE-2021-20257: Fixed an infinite loop in the e1000 emulated device, which\n could cause an excessive CPU consumption in the host (bsc#1182846).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-1375,SUSE-SLE-SERVER-12-SP2-BCL-2022-1375", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_1375-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:1375-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20221375-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:1375-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-April/010821.html" }, { "category": "self", "summary": "SUSE Bug 1182846", "url": "https://bugzilla.suse.com/1182846" }, { "category": "self", "summary": "SUSE Bug 1196915", "url": "https://bugzilla.suse.com/1196915" }, { "category": "self", "summary": "SUSE Bug 1197423", "url": "https://bugzilla.suse.com/1197423" }, { "category": "self", "summary": "SUSE Bug 1197425", "url": "https://bugzilla.suse.com/1197425" }, { "category": "self", "summary": "SUSE Bug 1197426", "url": "https://bugzilla.suse.com/1197426" }, { "category": "self", "summary": "SUSE CVE CVE-2021-20257 page", "url": "https://www.suse.com/security/cve/CVE-2021-20257/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-26401 page", "url": "https://www.suse.com/security/cve/CVE-2021-26401/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0001 page", "url": "https://www.suse.com/security/cve/CVE-2022-0001/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0002 page", "url": "https://www.suse.com/security/cve/CVE-2022-0002/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-26356 page", "url": "https://www.suse.com/security/cve/CVE-2022-26356/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-26357 page", "url": "https://www.suse.com/security/cve/CVE-2022-26357/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-26358 page", "url": "https://www.suse.com/security/cve/CVE-2022-26358/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-26359 page", "url": "https://www.suse.com/security/cve/CVE-2022-26359/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-26360 page", "url": "https://www.suse.com/security/cve/CVE-2022-26360/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-26361 page", "url": "https://www.suse.com/security/cve/CVE-2022-26361/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2022-04-25T13:40:49Z", "generator": { "date": "2022-04-25T13:40:49Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:1375-1", "initial_release_date": "2022-04-25T13:40:49Z", "revision_history": [ { "date": "2022-04-25T13:40:49Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-4.7.6_22-43.88.1.aarch64", "product": { "name": "xen-4.7.6_22-43.88.1.aarch64", "product_id": "xen-4.7.6_22-43.88.1.aarch64" } }, { "category": "product_version", "name": "xen-devel-4.7.6_22-43.88.1.aarch64", "product": { "name": "xen-devel-4.7.6_22-43.88.1.aarch64", "product_id": "xen-devel-4.7.6_22-43.88.1.aarch64" } }, { "category": "product_version", "name": "xen-doc-html-4.7.6_22-43.88.1.aarch64", "product": { "name": "xen-doc-html-4.7.6_22-43.88.1.aarch64", "product_id": "xen-doc-html-4.7.6_22-43.88.1.aarch64" } }, { "category": "product_version", "name": "xen-libs-4.7.6_22-43.88.1.aarch64", "product": { "name": "xen-libs-4.7.6_22-43.88.1.aarch64", "product_id": "xen-libs-4.7.6_22-43.88.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-4.7.6_22-43.88.1.aarch64", "product": { "name": "xen-tools-4.7.6_22-43.88.1.aarch64", "product_id": "xen-tools-4.7.6_22-43.88.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-domU-4.7.6_22-43.88.1.aarch64", "product": { "name": "xen-tools-domU-4.7.6_22-43.88.1.aarch64", "product_id": "xen-tools-domU-4.7.6_22-43.88.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "xen-libs-64bit-4.7.6_22-43.88.1.aarch64_ilp32", "product": { "name": "xen-libs-64bit-4.7.6_22-43.88.1.aarch64_ilp32", "product_id": "xen-libs-64bit-4.7.6_22-43.88.1.aarch64_ilp32" } } ], "category": "architecture", "name": "aarch64_ilp32" }, { "branches": [ { "category": "product_version", "name": "xen-devel-4.7.6_22-43.88.1.i586", "product": { "name": "xen-devel-4.7.6_22-43.88.1.i586", "product_id": "xen-devel-4.7.6_22-43.88.1.i586" } }, { "category": "product_version", "name": "xen-libs-4.7.6_22-43.88.1.i586", "product": { "name": "xen-libs-4.7.6_22-43.88.1.i586", "product_id": "xen-libs-4.7.6_22-43.88.1.i586" } }, { "category": "product_version", "name": "xen-tools-domU-4.7.6_22-43.88.1.i586", "product": { "name": "xen-tools-domU-4.7.6_22-43.88.1.i586", "product_id": "xen-tools-domU-4.7.6_22-43.88.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "xen-4.7.6_22-43.88.1.x86_64", "product": { "name": "xen-4.7.6_22-43.88.1.x86_64", "product_id": "xen-4.7.6_22-43.88.1.x86_64" } }, { "category": "product_version", "name": "xen-devel-4.7.6_22-43.88.1.x86_64", "product": { "name": "xen-devel-4.7.6_22-43.88.1.x86_64", "product_id": "xen-devel-4.7.6_22-43.88.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.7.6_22-43.88.1.x86_64", "product": { "name": "xen-doc-html-4.7.6_22-43.88.1.x86_64", "product_id": "xen-doc-html-4.7.6_22-43.88.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.7.6_22-43.88.1.x86_64", "product": { "name": "xen-libs-4.7.6_22-43.88.1.x86_64", "product_id": "xen-libs-4.7.6_22-43.88.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.7.6_22-43.88.1.x86_64", "product": { "name": "xen-libs-32bit-4.7.6_22-43.88.1.x86_64", "product_id": "xen-libs-32bit-4.7.6_22-43.88.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.7.6_22-43.88.1.x86_64", "product": { "name": "xen-tools-4.7.6_22-43.88.1.x86_64", "product_id": "xen-tools-4.7.6_22-43.88.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.7.6_22-43.88.1.x86_64", "product": { "name": "xen-tools-domU-4.7.6_22-43.88.1.x86_64", "product_id": "xen-tools-domU-4.7.6_22-43.88.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-4.7.6_22-43.88.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_22-43.88.1.x86_64" }, "product_reference": "xen-4.7.6_22-43.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.7.6_22-43.88.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_22-43.88.1.x86_64" }, "product_reference": "xen-doc-html-4.7.6_22-43.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.7.6_22-43.88.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_22-43.88.1.x86_64" }, "product_reference": "xen-libs-4.7.6_22-43.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.7.6_22-43.88.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_22-43.88.1.x86_64" }, "product_reference": "xen-libs-32bit-4.7.6_22-43.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.7.6_22-43.88.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_22-43.88.1.x86_64" }, "product_reference": "xen-tools-4.7.6_22-43.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.7.6_22-43.88.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_22-43.88.1.x86_64" }, "product_reference": "xen-tools-domU-4.7.6_22-43.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-20257", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-20257" } ], "notes": [ { "category": "general", "text": "An infinite loop flaw was found in the e1000 NIC emulator of the QEMU. This issue occurs while processing transmits (tx) descriptors in process_tx_desc if various descriptor fields are initialized with invalid values. This flaw allows a guest to consume CPU cycles on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_22-43.88.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-20257", "url": "https://www.suse.com/security/cve/CVE-2021-20257" }, { "category": "external", "summary": "SUSE Bug 1182577 for CVE-2021-20257", "url": "https://bugzilla.suse.com/1182577" }, { "category": "external", "summary": "SUSE Bug 1182846 for CVE-2021-20257", "url": "https://bugzilla.suse.com/1182846" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_22-43.88.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.2, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_22-43.88.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-25T13:40:49Z", "details": "low" } ], "title": "CVE-2021-20257" }, { "cve": "CVE-2021-26401", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-26401" } ], "notes": [ { "category": "general", "text": "LFENCE/JMP (mitigation V2-2) may not sufficiently mitigate CVE-2017-5715 on some AMD CPUs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_22-43.88.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-26401", "url": "https://www.suse.com/security/cve/CVE-2021-26401" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2021-26401", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2021-26401", "url": "https://bugzilla.suse.com/1196901" }, { "category": "external", "summary": "SUSE Bug 1209630 for CVE-2021-26401", "url": "https://bugzilla.suse.com/1209630" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_22-43.88.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_22-43.88.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-25T13:40:49Z", "details": "moderate" } ], "title": "CVE-2021-26401" }, { "cve": "CVE-2022-0001", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0001" } ], "notes": [ { "category": "general", "text": "Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_22-43.88.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0001", "url": "https://www.suse.com/security/cve/CVE-2022-0001" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2022-0001", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2022-0001", "url": "https://bugzilla.suse.com/1196901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_22-43.88.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_22-43.88.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-25T13:40:49Z", "details": "moderate" } ], "title": "CVE-2022-0001" }, { "cve": "CVE-2022-0002", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0002" } ], "notes": [ { "category": "general", "text": "Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_22-43.88.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0002", "url": "https://www.suse.com/security/cve/CVE-2022-0002" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2022-0002", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2022-0002", "url": "https://bugzilla.suse.com/1196901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_22-43.88.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_22-43.88.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-25T13:40:49Z", "details": "moderate" } ], "title": "CVE-2022-0002" }, { "cve": "CVE-2022-26356", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-26356" } ], "notes": [ { "category": "general", "text": "Racy interactions between dirty vram tracking and paging log dirty hypercalls Activation of log dirty mode done by XEN_DMOP_track_dirty_vram (was named HVMOP_track_dirty_vram before Xen 4.9) is racy with ongoing log dirty hypercalls. A suitably timed call to XEN_DMOP_track_dirty_vram can enable log dirty while another CPU is still in the process of tearing down the structures related to a previously enabled log dirty mode (XEN_DOMCTL_SHADOW_OP_OFF). This is due to lack of mutually exclusive locking between both operations and can lead to entries being added in already freed slots, resulting in a memory leak.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_22-43.88.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-26356", "url": "https://www.suse.com/security/cve/CVE-2022-26356" }, { "category": "external", "summary": "SUSE Bug 1197423 for CVE-2022-26356", "url": "https://bugzilla.suse.com/1197423" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_22-43.88.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_22-43.88.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-25T13:40:49Z", "details": "moderate" } ], "title": "CVE-2022-26356" }, { "cve": "CVE-2022-26357", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-26357" } ], "notes": [ { "category": "general", "text": "race in VT-d domain ID cleanup Xen domain IDs are up to 15 bits wide. VT-d hardware may allow for only less than 15 bits to hold a domain ID associating a physical device with a particular domain. Therefore internally Xen domain IDs are mapped to the smaller value range. The cleaning up of the housekeeping structures has a race, allowing for VT-d domain IDs to be leaked and flushes to be bypassed.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_22-43.88.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-26357", "url": "https://www.suse.com/security/cve/CVE-2022-26357" }, { "category": "external", "summary": "SUSE Bug 1197425 for CVE-2022-26357", "url": "https://bugzilla.suse.com/1197425" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_22-43.88.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_22-43.88.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-25T13:40:49Z", "details": "moderate" } ], "title": "CVE-2022-26357" }, { "cve": "CVE-2022-26358", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-26358" } ], "notes": [ { "category": "general", "text": "IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Certain PCI devices in a system might be assigned Reserved Memory Regions (specified via Reserved Memory Region Reporting, \"RMRR\") for Intel VT-d or Unity Mapping ranges for AMD-Vi. These are typically used for platform tasks such as legacy USB emulation. Since the precise purpose of these regions is unknown, once a device associated with such a region is active, the mappings of these regions need to remain continuouly accessible by the device. This requirement has been violated. Subsequent DMA or interrupts from the device may have unpredictable behaviour, ranging from IOMMU faults to memory corruption.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_22-43.88.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-26358", "url": "https://www.suse.com/security/cve/CVE-2022-26358" }, { "category": "external", "summary": "SUSE Bug 1197426 for CVE-2022-26358", "url": "https://bugzilla.suse.com/1197426" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_22-43.88.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_22-43.88.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-25T13:40:49Z", "details": "moderate" } ], "title": "CVE-2022-26358" }, { "cve": "CVE-2022-26359", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-26359" } ], "notes": [ { "category": "general", "text": "IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Certain PCI devices in a system might be assigned Reserved Memory Regions (specified via Reserved Memory Region Reporting, \"RMRR\") for Intel VT-d or Unity Mapping ranges for AMD-Vi. These are typically used for platform tasks such as legacy USB emulation. Since the precise purpose of these regions is unknown, once a device associated with such a region is active, the mappings of these regions need to remain continuouly accessible by the device. This requirement has been violated. Subsequent DMA or interrupts from the device may have unpredictable behaviour, ranging from IOMMU faults to memory corruption.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_22-43.88.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-26359", "url": "https://www.suse.com/security/cve/CVE-2022-26359" }, { "category": "external", "summary": "SUSE Bug 1197426 for CVE-2022-26359", "url": "https://bugzilla.suse.com/1197426" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_22-43.88.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_22-43.88.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-25T13:40:49Z", "details": "moderate" } ], "title": "CVE-2022-26359" }, { "cve": "CVE-2022-26360", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-26360" } ], "notes": [ { "category": "general", "text": "IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Certain PCI devices in a system might be assigned Reserved Memory Regions (specified via Reserved Memory Region Reporting, \"RMRR\") for Intel VT-d or Unity Mapping ranges for AMD-Vi. These are typically used for platform tasks such as legacy USB emulation. Since the precise purpose of these regions is unknown, once a device associated with such a region is active, the mappings of these regions need to remain continuouly accessible by the device. This requirement has been violated. Subsequent DMA or interrupts from the device may have unpredictable behaviour, ranging from IOMMU faults to memory corruption.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_22-43.88.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-26360", "url": "https://www.suse.com/security/cve/CVE-2022-26360" }, { "category": "external", "summary": "SUSE Bug 1197426 for CVE-2022-26360", "url": "https://bugzilla.suse.com/1197426" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_22-43.88.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_22-43.88.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-25T13:40:49Z", "details": "moderate" } ], "title": "CVE-2022-26360" }, { "cve": "CVE-2022-26361", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-26361" } ], "notes": [ { "category": "general", "text": "IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Certain PCI devices in a system might be assigned Reserved Memory Regions (specified via Reserved Memory Region Reporting, \"RMRR\") for Intel VT-d or Unity Mapping ranges for AMD-Vi. These are typically used for platform tasks such as legacy USB emulation. Since the precise purpose of these regions is unknown, once a device associated with such a region is active, the mappings of these regions need to remain continuouly accessible by the device. This requirement has been violated. Subsequent DMA or interrupts from the device may have unpredictable behaviour, ranging from IOMMU faults to memory corruption.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_22-43.88.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-26361", "url": "https://www.suse.com/security/cve/CVE-2022-26361" }, { "category": "external", "summary": "SUSE Bug 1197426 for CVE-2022-26361", "url": "https://bugzilla.suse.com/1197426" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_22-43.88.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.6_22-43.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.6_22-43.88.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-25T13:40:49Z", "details": "moderate" } ], "title": "CVE-2022-26361" } ] }
suse-su-2022:0756-1
Vulnerability from csaf_suse
Published
2022-03-08 18:03
Modified
2022-03-08 18:03
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.
Transient execution side-channel attacks attacking the Branch History Buffer (BHB),
named 'Branch Target Injection' and 'Intra-Mode Branch History Injection' are now mitigated.
The following security bugs were fixed:
- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).
- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).
- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)
- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
- CVE-2022-24448: Fixed an issue in fs/nfs/dir.c. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).
- CVE-2021-0920: Fixed a local privilege escalation due to a use-after-free bug in unix_gc (bsc#1193731).
- CVE-2016-10905: Fixed a use-after-free is gfs2_clear_rgrpd() and read_rindex_entry() (bsc#1146312).
The following non-security bug was fixed:
- net: sched: sch_teql: fix null-pointer dereference (bsc#1190717).
Patchnames
SUSE-2022-756,SUSE-SLE-SERVER-12-SP2-BCL-2022-756
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.\n\n\nTransient execution side-channel attacks attacking the Branch History Buffer (BHB),\nnamed \u0027Branch Target Injection\u0027 and \u0027Intra-Mode Branch History Injection\u0027 are now mitigated.\n\nThe following security bugs were fixed:\n\n- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).\n- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).\n- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)\n- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).\n- CVE-2022-24448: Fixed an issue in fs/nfs/dir.c. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).\n- CVE-2021-0920: Fixed a local privilege escalation due to a use-after-free bug in unix_gc (bsc#1193731).\n- CVE-2016-10905: Fixed a use-after-free is gfs2_clear_rgrpd() and read_rindex_entry() (bsc#1146312).\n\nThe following non-security bug was fixed:\n\n- net: sched: sch_teql: fix null-pointer dereference (bsc#1190717).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-756,SUSE-SLE-SERVER-12-SP2-BCL-2022-756", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0756-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:0756-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220756-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:0756-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010401.html" }, { "category": "self", "summary": "SUSE Bug 1146312", "url": "https://bugzilla.suse.com/1146312" }, { "category": "self", "summary": "SUSE Bug 1190717", "url": "https://bugzilla.suse.com/1190717" }, { "category": "self", "summary": "SUSE Bug 1191580", "url": "https://bugzilla.suse.com/1191580" }, { "category": "self", "summary": "SUSE Bug 1193731", "url": "https://bugzilla.suse.com/1193731" }, { "category": "self", "summary": "SUSE Bug 1194463", "url": "https://bugzilla.suse.com/1194463" }, { "category": "self", "summary": "SUSE Bug 1195543", "url": "https://bugzilla.suse.com/1195543" }, { "category": "self", "summary": "SUSE Bug 1195612", "url": "https://bugzilla.suse.com/1195612" }, { "category": "self", "summary": "SUSE Bug 1195908", "url": "https://bugzilla.suse.com/1195908" }, { "category": "self", "summary": "SUSE Bug 1195939", "url": "https://bugzilla.suse.com/1195939" }, { "category": "self", "summary": "SUSE Bug 1196079", "url": "https://bugzilla.suse.com/1196079" }, { "category": "self", "summary": "SUSE Bug 1196612", "url": "https://bugzilla.suse.com/1196612" }, { "category": "self", "summary": "SUSE CVE CVE-2016-10905 page", "url": "https://www.suse.com/security/cve/CVE-2016-10905/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-0920 page", "url": "https://www.suse.com/security/cve/CVE-2021-0920/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0001 page", "url": "https://www.suse.com/security/cve/CVE-2022-0001/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0002 page", "url": "https://www.suse.com/security/cve/CVE-2022-0002/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0492 page", "url": "https://www.suse.com/security/cve/CVE-2022-0492/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0617 page", "url": "https://www.suse.com/security/cve/CVE-2022-0617/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-24448 page", "url": "https://www.suse.com/security/cve/CVE-2022-24448/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2022-03-08T18:03:12Z", "generator": { "date": "2022-03-08T18:03:12Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:0756-1", "initial_release_date": "2022-03-08T18:03:12Z", "revision_history": [ { "date": "2022-03-08T18:03:12Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.169.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.4.121-92.169.1.aarch64", "product_id": "cluster-md-kmp-default-4.4.121-92.169.1.aarch64" } }, { "category": "product_version", "name": "cluster-md-kmp-vanilla-4.4.121-92.169.1.aarch64", "product": { "name": "cluster-md-kmp-vanilla-4.4.121-92.169.1.aarch64", "product_id": "cluster-md-kmp-vanilla-4.4.121-92.169.1.aarch64" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.169.1.aarch64", "product": { "name": "cluster-network-kmp-default-4.4.121-92.169.1.aarch64", "product_id": "cluster-network-kmp-default-4.4.121-92.169.1.aarch64" } }, { "category": "product_version", "name": "cluster-network-kmp-vanilla-4.4.121-92.169.1.aarch64", "product": { "name": "cluster-network-kmp-vanilla-4.4.121-92.169.1.aarch64", "product_id": "cluster-network-kmp-vanilla-4.4.121-92.169.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.169.1.aarch64", "product": { "name": "dlm-kmp-default-4.4.121-92.169.1.aarch64", "product_id": "dlm-kmp-default-4.4.121-92.169.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-vanilla-4.4.121-92.169.1.aarch64", "product": { "name": "dlm-kmp-vanilla-4.4.121-92.169.1.aarch64", "product_id": "dlm-kmp-vanilla-4.4.121-92.169.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.169.1.aarch64", "product": { "name": "gfs2-kmp-default-4.4.121-92.169.1.aarch64", "product_id": "gfs2-kmp-default-4.4.121-92.169.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-vanilla-4.4.121-92.169.1.aarch64", "product": { "name": "gfs2-kmp-vanilla-4.4.121-92.169.1.aarch64", "product_id": "gfs2-kmp-vanilla-4.4.121-92.169.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.4.121-92.169.1.aarch64", "product": { "name": "kernel-default-4.4.121-92.169.1.aarch64", "product_id": "kernel-default-4.4.121-92.169.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.169.1.aarch64", "product": { "name": "kernel-default-base-4.4.121-92.169.1.aarch64", "product_id": "kernel-default-base-4.4.121-92.169.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.169.1.aarch64", "product": { "name": "kernel-default-devel-4.4.121-92.169.1.aarch64", "product_id": "kernel-default-devel-4.4.121-92.169.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.121-92.169.1.aarch64", "product": { "name": "kernel-default-extra-4.4.121-92.169.1.aarch64", "product_id": "kernel-default-extra-4.4.121-92.169.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.121-92.169.1.aarch64", "product": { "name": "kernel-default-kgraft-4.4.121-92.169.1.aarch64", "product_id": "kernel-default-kgraft-4.4.121-92.169.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.121-92.169.1.aarch64", "product": { "name": "kernel-obs-build-4.4.121-92.169.1.aarch64", "product_id": "kernel-obs-build-4.4.121-92.169.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.121-92.169.1.aarch64", "product": { "name": "kernel-obs-qa-4.4.121-92.169.1.aarch64", "product_id": "kernel-obs-qa-4.4.121-92.169.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.169.1.aarch64", "product": { "name": "kernel-syms-4.4.121-92.169.1.aarch64", "product_id": "kernel-syms-4.4.121-92.169.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.121-92.169.1.aarch64", "product": { "name": "kernel-vanilla-4.4.121-92.169.1.aarch64", "product_id": "kernel-vanilla-4.4.121-92.169.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.121-92.169.1.aarch64", "product": { "name": "kernel-vanilla-base-4.4.121-92.169.1.aarch64", "product_id": "kernel-vanilla-base-4.4.121-92.169.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.121-92.169.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.4.121-92.169.1.aarch64", "product_id": "kernel-vanilla-devel-4.4.121-92.169.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.169.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.4.121-92.169.1.aarch64", "product_id": "ocfs2-kmp-default-4.4.121-92.169.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-vanilla-4.4.121-92.169.1.aarch64", "product": { "name": "ocfs2-kmp-vanilla-4.4.121-92.169.1.aarch64", "product_id": "ocfs2-kmp-vanilla-4.4.121-92.169.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.4.121-92.169.1.noarch", "product": { "name": "kernel-devel-4.4.121-92.169.1.noarch", "product_id": "kernel-devel-4.4.121-92.169.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.4.121-92.169.1.noarch", "product": { "name": "kernel-docs-4.4.121-92.169.1.noarch", "product_id": "kernel-docs-4.4.121-92.169.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.4.121-92.169.1.noarch", "product": { "name": "kernel-docs-html-4.4.121-92.169.1.noarch", "product_id": "kernel-docs-html-4.4.121-92.169.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-pdf-4.4.121-92.169.1.noarch", "product": { "name": "kernel-docs-pdf-4.4.121-92.169.1.noarch", "product_id": "kernel-docs-pdf-4.4.121-92.169.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.4.121-92.169.1.noarch", "product": { "name": "kernel-macros-4.4.121-92.169.1.noarch", "product_id": "kernel-macros-4.4.121-92.169.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.4.121-92.169.1.noarch", "product": { "name": "kernel-source-4.4.121-92.169.1.noarch", "product_id": "kernel-source-4.4.121-92.169.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.4.121-92.169.1.noarch", "product": { "name": "kernel-source-vanilla-4.4.121-92.169.1.noarch", "product_id": "kernel-source-vanilla-4.4.121-92.169.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-debug-4.4.121-92.169.1.ppc64le", "product": { "name": "cluster-md-kmp-debug-4.4.121-92.169.1.ppc64le", "product_id": "cluster-md-kmp-debug-4.4.121-92.169.1.ppc64le" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.169.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.4.121-92.169.1.ppc64le", "product_id": "cluster-md-kmp-default-4.4.121-92.169.1.ppc64le" } }, { "category": "product_version", "name": "cluster-md-kmp-vanilla-4.4.121-92.169.1.ppc64le", "product": { "name": "cluster-md-kmp-vanilla-4.4.121-92.169.1.ppc64le", "product_id": "cluster-md-kmp-vanilla-4.4.121-92.169.1.ppc64le" } }, { "category": "product_version", "name": "cluster-network-kmp-debug-4.4.121-92.169.1.ppc64le", "product": { "name": "cluster-network-kmp-debug-4.4.121-92.169.1.ppc64le", "product_id": "cluster-network-kmp-debug-4.4.121-92.169.1.ppc64le" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.169.1.ppc64le", "product": { "name": "cluster-network-kmp-default-4.4.121-92.169.1.ppc64le", "product_id": "cluster-network-kmp-default-4.4.121-92.169.1.ppc64le" } }, { "category": "product_version", "name": "cluster-network-kmp-vanilla-4.4.121-92.169.1.ppc64le", "product": { "name": "cluster-network-kmp-vanilla-4.4.121-92.169.1.ppc64le", "product_id": "cluster-network-kmp-vanilla-4.4.121-92.169.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-debug-4.4.121-92.169.1.ppc64le", "product": { "name": "dlm-kmp-debug-4.4.121-92.169.1.ppc64le", "product_id": "dlm-kmp-debug-4.4.121-92.169.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.169.1.ppc64le", "product": { "name": "dlm-kmp-default-4.4.121-92.169.1.ppc64le", "product_id": "dlm-kmp-default-4.4.121-92.169.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-vanilla-4.4.121-92.169.1.ppc64le", "product": { "name": "dlm-kmp-vanilla-4.4.121-92.169.1.ppc64le", "product_id": "dlm-kmp-vanilla-4.4.121-92.169.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-debug-4.4.121-92.169.1.ppc64le", "product": { "name": "gfs2-kmp-debug-4.4.121-92.169.1.ppc64le", "product_id": "gfs2-kmp-debug-4.4.121-92.169.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.169.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.4.121-92.169.1.ppc64le", "product_id": "gfs2-kmp-default-4.4.121-92.169.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-vanilla-4.4.121-92.169.1.ppc64le", "product": { "name": "gfs2-kmp-vanilla-4.4.121-92.169.1.ppc64le", "product_id": "gfs2-kmp-vanilla-4.4.121-92.169.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.4.121-92.169.1.ppc64le", "product": { "name": "kernel-debug-4.4.121-92.169.1.ppc64le", "product_id": "kernel-debug-4.4.121-92.169.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.4.121-92.169.1.ppc64le", "product": { "name": "kernel-debug-base-4.4.121-92.169.1.ppc64le", "product_id": "kernel-debug-base-4.4.121-92.169.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.4.121-92.169.1.ppc64le", "product": { "name": "kernel-debug-devel-4.4.121-92.169.1.ppc64le", "product_id": "kernel-debug-devel-4.4.121-92.169.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-extra-4.4.121-92.169.1.ppc64le", "product": { "name": "kernel-debug-extra-4.4.121-92.169.1.ppc64le", "product_id": "kernel-debug-extra-4.4.121-92.169.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-kgraft-4.4.121-92.169.1.ppc64le", "product": { "name": "kernel-debug-kgraft-4.4.121-92.169.1.ppc64le", "product_id": "kernel-debug-kgraft-4.4.121-92.169.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.4.121-92.169.1.ppc64le", "product": { "name": "kernel-default-4.4.121-92.169.1.ppc64le", "product_id": "kernel-default-4.4.121-92.169.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.169.1.ppc64le", "product": { "name": "kernel-default-base-4.4.121-92.169.1.ppc64le", "product_id": "kernel-default-base-4.4.121-92.169.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.169.1.ppc64le", "product": { "name": "kernel-default-devel-4.4.121-92.169.1.ppc64le", "product_id": "kernel-default-devel-4.4.121-92.169.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.121-92.169.1.ppc64le", "product": { "name": "kernel-default-extra-4.4.121-92.169.1.ppc64le", "product_id": "kernel-default-extra-4.4.121-92.169.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.121-92.169.1.ppc64le", "product": { "name": "kernel-default-kgraft-4.4.121-92.169.1.ppc64le", "product_id": "kernel-default-kgraft-4.4.121-92.169.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.121-92.169.1.ppc64le", "product": { "name": "kernel-obs-build-4.4.121-92.169.1.ppc64le", "product_id": "kernel-obs-build-4.4.121-92.169.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.121-92.169.1.ppc64le", "product": { "name": "kernel-obs-qa-4.4.121-92.169.1.ppc64le", "product_id": "kernel-obs-qa-4.4.121-92.169.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.169.1.ppc64le", "product": { "name": "kernel-syms-4.4.121-92.169.1.ppc64le", "product_id": "kernel-syms-4.4.121-92.169.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.121-92.169.1.ppc64le", "product": { "name": "kernel-vanilla-4.4.121-92.169.1.ppc64le", "product_id": "kernel-vanilla-4.4.121-92.169.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.121-92.169.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.4.121-92.169.1.ppc64le", "product_id": "kernel-vanilla-base-4.4.121-92.169.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.121-92.169.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.4.121-92.169.1.ppc64le", "product_id": "kernel-vanilla-devel-4.4.121-92.169.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-debug-4.4.121-92.169.1.ppc64le", "product": { "name": "ocfs2-kmp-debug-4.4.121-92.169.1.ppc64le", "product_id": "ocfs2-kmp-debug-4.4.121-92.169.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.169.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.4.121-92.169.1.ppc64le", "product_id": "ocfs2-kmp-default-4.4.121-92.169.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-vanilla-4.4.121-92.169.1.ppc64le", "product": { "name": "ocfs2-kmp-vanilla-4.4.121-92.169.1.ppc64le", "product_id": "ocfs2-kmp-vanilla-4.4.121-92.169.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.169.1.s390x", "product": { "name": "cluster-md-kmp-default-4.4.121-92.169.1.s390x", "product_id": "cluster-md-kmp-default-4.4.121-92.169.1.s390x" } }, { "category": "product_version", "name": "cluster-md-kmp-vanilla-4.4.121-92.169.1.s390x", "product": { "name": "cluster-md-kmp-vanilla-4.4.121-92.169.1.s390x", "product_id": "cluster-md-kmp-vanilla-4.4.121-92.169.1.s390x" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.169.1.s390x", "product": { "name": "cluster-network-kmp-default-4.4.121-92.169.1.s390x", "product_id": "cluster-network-kmp-default-4.4.121-92.169.1.s390x" } }, { "category": "product_version", "name": "cluster-network-kmp-vanilla-4.4.121-92.169.1.s390x", "product": { "name": "cluster-network-kmp-vanilla-4.4.121-92.169.1.s390x", "product_id": "cluster-network-kmp-vanilla-4.4.121-92.169.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.169.1.s390x", "product": { "name": "dlm-kmp-default-4.4.121-92.169.1.s390x", "product_id": "dlm-kmp-default-4.4.121-92.169.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-vanilla-4.4.121-92.169.1.s390x", "product": { "name": "dlm-kmp-vanilla-4.4.121-92.169.1.s390x", "product_id": "dlm-kmp-vanilla-4.4.121-92.169.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.169.1.s390x", "product": { "name": "gfs2-kmp-default-4.4.121-92.169.1.s390x", "product_id": "gfs2-kmp-default-4.4.121-92.169.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-vanilla-4.4.121-92.169.1.s390x", "product": { "name": "gfs2-kmp-vanilla-4.4.121-92.169.1.s390x", "product_id": "gfs2-kmp-vanilla-4.4.121-92.169.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.4.121-92.169.1.s390x", "product": { "name": "kernel-default-4.4.121-92.169.1.s390x", "product_id": "kernel-default-4.4.121-92.169.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.169.1.s390x", "product": { "name": "kernel-default-base-4.4.121-92.169.1.s390x", "product_id": "kernel-default-base-4.4.121-92.169.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.169.1.s390x", "product": { "name": "kernel-default-devel-4.4.121-92.169.1.s390x", "product_id": "kernel-default-devel-4.4.121-92.169.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.121-92.169.1.s390x", "product": { "name": "kernel-default-extra-4.4.121-92.169.1.s390x", "product_id": "kernel-default-extra-4.4.121-92.169.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.121-92.169.1.s390x", "product": { "name": "kernel-default-kgraft-4.4.121-92.169.1.s390x", "product_id": "kernel-default-kgraft-4.4.121-92.169.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.4.121-92.169.1.s390x", "product": { "name": "kernel-default-man-4.4.121-92.169.1.s390x", "product_id": "kernel-default-man-4.4.121-92.169.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.121-92.169.1.s390x", "product": { "name": "kernel-obs-build-4.4.121-92.169.1.s390x", "product_id": "kernel-obs-build-4.4.121-92.169.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.121-92.169.1.s390x", "product": { "name": "kernel-obs-qa-4.4.121-92.169.1.s390x", "product_id": "kernel-obs-qa-4.4.121-92.169.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.169.1.s390x", "product": { "name": "kernel-syms-4.4.121-92.169.1.s390x", "product_id": "kernel-syms-4.4.121-92.169.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.121-92.169.1.s390x", "product": { "name": "kernel-vanilla-4.4.121-92.169.1.s390x", "product_id": "kernel-vanilla-4.4.121-92.169.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.121-92.169.1.s390x", "product": { "name": "kernel-vanilla-base-4.4.121-92.169.1.s390x", "product_id": "kernel-vanilla-base-4.4.121-92.169.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.121-92.169.1.s390x", "product": { "name": "kernel-vanilla-devel-4.4.121-92.169.1.s390x", "product_id": "kernel-vanilla-devel-4.4.121-92.169.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.4.121-92.169.1.s390x", "product": { "name": "kernel-zfcpdump-4.4.121-92.169.1.s390x", "product_id": "kernel-zfcpdump-4.4.121-92.169.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.169.1.s390x", "product": { "name": "ocfs2-kmp-default-4.4.121-92.169.1.s390x", "product_id": "ocfs2-kmp-default-4.4.121-92.169.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-vanilla-4.4.121-92.169.1.s390x", "product": { "name": "ocfs2-kmp-vanilla-4.4.121-92.169.1.s390x", "product_id": "ocfs2-kmp-vanilla-4.4.121-92.169.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-debug-4.4.121-92.169.1.x86_64", "product": { "name": "cluster-md-kmp-debug-4.4.121-92.169.1.x86_64", "product_id": "cluster-md-kmp-debug-4.4.121-92.169.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.169.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.4.121-92.169.1.x86_64", "product_id": "cluster-md-kmp-default-4.4.121-92.169.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-vanilla-4.4.121-92.169.1.x86_64", "product": { "name": "cluster-md-kmp-vanilla-4.4.121-92.169.1.x86_64", "product_id": "cluster-md-kmp-vanilla-4.4.121-92.169.1.x86_64" } }, { "category": "product_version", "name": "cluster-network-kmp-debug-4.4.121-92.169.1.x86_64", "product": { "name": "cluster-network-kmp-debug-4.4.121-92.169.1.x86_64", "product_id": "cluster-network-kmp-debug-4.4.121-92.169.1.x86_64" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.169.1.x86_64", "product": { "name": "cluster-network-kmp-default-4.4.121-92.169.1.x86_64", "product_id": "cluster-network-kmp-default-4.4.121-92.169.1.x86_64" } }, { "category": "product_version", "name": "cluster-network-kmp-vanilla-4.4.121-92.169.1.x86_64", "product": { "name": "cluster-network-kmp-vanilla-4.4.121-92.169.1.x86_64", "product_id": "cluster-network-kmp-vanilla-4.4.121-92.169.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-debug-4.4.121-92.169.1.x86_64", "product": { "name": "dlm-kmp-debug-4.4.121-92.169.1.x86_64", "product_id": "dlm-kmp-debug-4.4.121-92.169.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.169.1.x86_64", "product": { "name": "dlm-kmp-default-4.4.121-92.169.1.x86_64", "product_id": "dlm-kmp-default-4.4.121-92.169.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-vanilla-4.4.121-92.169.1.x86_64", "product": { "name": "dlm-kmp-vanilla-4.4.121-92.169.1.x86_64", "product_id": "dlm-kmp-vanilla-4.4.121-92.169.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-debug-4.4.121-92.169.1.x86_64", "product": { "name": "gfs2-kmp-debug-4.4.121-92.169.1.x86_64", "product_id": "gfs2-kmp-debug-4.4.121-92.169.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.169.1.x86_64", "product": { "name": "gfs2-kmp-default-4.4.121-92.169.1.x86_64", "product_id": "gfs2-kmp-default-4.4.121-92.169.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-vanilla-4.4.121-92.169.1.x86_64", "product": { "name": "gfs2-kmp-vanilla-4.4.121-92.169.1.x86_64", "product_id": "gfs2-kmp-vanilla-4.4.121-92.169.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.4.121-92.169.1.x86_64", "product": { "name": "kernel-debug-4.4.121-92.169.1.x86_64", "product_id": "kernel-debug-4.4.121-92.169.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.4.121-92.169.1.x86_64", "product": { "name": "kernel-debug-base-4.4.121-92.169.1.x86_64", "product_id": "kernel-debug-base-4.4.121-92.169.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.4.121-92.169.1.x86_64", "product": { "name": "kernel-debug-devel-4.4.121-92.169.1.x86_64", "product_id": "kernel-debug-devel-4.4.121-92.169.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-extra-4.4.121-92.169.1.x86_64", "product": { "name": "kernel-debug-extra-4.4.121-92.169.1.x86_64", "product_id": "kernel-debug-extra-4.4.121-92.169.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-kgraft-4.4.121-92.169.1.x86_64", "product": { "name": "kernel-debug-kgraft-4.4.121-92.169.1.x86_64", "product_id": "kernel-debug-kgraft-4.4.121-92.169.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.4.121-92.169.1.x86_64", "product": { "name": "kernel-default-4.4.121-92.169.1.x86_64", "product_id": "kernel-default-4.4.121-92.169.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.169.1.x86_64", "product": { "name": "kernel-default-base-4.4.121-92.169.1.x86_64", "product_id": "kernel-default-base-4.4.121-92.169.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.169.1.x86_64", "product": { "name": "kernel-default-devel-4.4.121-92.169.1.x86_64", "product_id": "kernel-default-devel-4.4.121-92.169.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.121-92.169.1.x86_64", "product": { "name": "kernel-default-extra-4.4.121-92.169.1.x86_64", "product_id": "kernel-default-extra-4.4.121-92.169.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.121-92.169.1.x86_64", "product": { "name": "kernel-default-kgraft-4.4.121-92.169.1.x86_64", "product_id": "kernel-default-kgraft-4.4.121-92.169.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.121-92.169.1.x86_64", "product": { "name": "kernel-obs-build-4.4.121-92.169.1.x86_64", "product_id": "kernel-obs-build-4.4.121-92.169.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.121-92.169.1.x86_64", "product": { "name": "kernel-obs-qa-4.4.121-92.169.1.x86_64", "product_id": "kernel-obs-qa-4.4.121-92.169.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.169.1.x86_64", "product": { "name": "kernel-syms-4.4.121-92.169.1.x86_64", "product_id": "kernel-syms-4.4.121-92.169.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.121-92.169.1.x86_64", "product": { "name": "kernel-vanilla-4.4.121-92.169.1.x86_64", "product_id": "kernel-vanilla-4.4.121-92.169.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.121-92.169.1.x86_64", "product": { "name": "kernel-vanilla-base-4.4.121-92.169.1.x86_64", "product_id": "kernel-vanilla-base-4.4.121-92.169.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.121-92.169.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.4.121-92.169.1.x86_64", "product_id": "kernel-vanilla-devel-4.4.121-92.169.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-debug-4.4.121-92.169.1.x86_64", "product": { "name": "ocfs2-kmp-debug-4.4.121-92.169.1.x86_64", "product_id": "ocfs2-kmp-debug-4.4.121-92.169.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.169.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.4.121-92.169.1.x86_64", "product_id": "ocfs2-kmp-default-4.4.121-92.169.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-vanilla-4.4.121-92.169.1.x86_64", "product": { "name": "ocfs2-kmp-vanilla-4.4.121-92.169.1.x86_64", "product_id": "ocfs2-kmp-vanilla-4.4.121-92.169.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.169.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.169.1.x86_64" }, "product_reference": "kernel-default-4.4.121-92.169.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.169.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.169.1.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.169.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.169.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.169.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.169.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.169.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.169.1.noarch" }, "product_reference": "kernel-devel-4.4.121-92.169.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.169.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.169.1.noarch" }, "product_reference": "kernel-macros-4.4.121-92.169.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.169.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.169.1.noarch" }, "product_reference": "kernel-source-4.4.121-92.169.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.169.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.169.1.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.169.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-10905", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-10905" } ], "notes": [ { "category": "general", "text": "An issue was discovered in fs/gfs2/rgrp.c in the Linux kernel before 4.8. A use-after-free is caused by the functions gfs2_clear_rgrpd and read_rindex_entry.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.169.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-10905", "url": "https://www.suse.com/security/cve/CVE-2016-10905" }, { "category": "external", "summary": "SUSE Bug 1146312 for CVE-2016-10905", "url": "https://bugzilla.suse.com/1146312" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.169.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.169.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:03:12Z", "details": "moderate" } ], "title": "CVE-2016-10905" }, { "cve": "CVE-2021-0920", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-0920" } ], "notes": [ { "category": "general", "text": "In unix_scm_to_skb of af_unix.c, there is a possible use after free bug due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-196926917References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.169.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-0920", "url": "https://www.suse.com/security/cve/CVE-2021-0920" }, { "category": "external", "summary": "SUSE Bug 1193731 for CVE-2021-0920", "url": "https://bugzilla.suse.com/1193731" }, { "category": "external", "summary": "SUSE Bug 1194463 for CVE-2021-0920", "url": "https://bugzilla.suse.com/1194463" }, { "category": "external", "summary": "SUSE Bug 1195939 for CVE-2021-0920", "url": "https://bugzilla.suse.com/1195939" }, { "category": "external", "summary": "SUSE Bug 1199255 for CVE-2021-0920", "url": "https://bugzilla.suse.com/1199255" }, { "category": "external", "summary": "SUSE Bug 1200084 for CVE-2021-0920", "url": "https://bugzilla.suse.com/1200084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.169.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.169.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:03:12Z", "details": "important" } ], "title": "CVE-2021-0920" }, { "cve": "CVE-2022-0001", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0001" } ], "notes": [ { "category": "general", "text": "Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.169.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0001", "url": "https://www.suse.com/security/cve/CVE-2022-0001" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2022-0001", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2022-0001", "url": "https://bugzilla.suse.com/1196901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.169.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.169.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:03:12Z", "details": "moderate" } ], "title": "CVE-2022-0001" }, { "cve": "CVE-2022-0002", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0002" } ], "notes": [ { "category": "general", "text": "Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.169.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0002", "url": "https://www.suse.com/security/cve/CVE-2022-0002" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2022-0002", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2022-0002", "url": "https://bugzilla.suse.com/1196901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.169.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.169.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:03:12Z", "details": "moderate" } ], "title": "CVE-2022-0002" }, { "cve": "CVE-2022-0492", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0492" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in the Linux kernel\u0027s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.169.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0492", "url": "https://www.suse.com/security/cve/CVE-2022-0492" }, { "category": "external", "summary": "SUSE Bug 1195543 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1195543" }, { "category": "external", "summary": "SUSE Bug 1195908 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1195908" }, { "category": "external", "summary": "SUSE Bug 1196612 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1196612" }, { "category": "external", "summary": "SUSE Bug 1196776 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1196776" }, { "category": "external", "summary": "SUSE Bug 1198615 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1198615" }, { "category": "external", "summary": "SUSE Bug 1199255 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1199255" }, { "category": "external", "summary": "SUSE Bug 1199615 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1199615" }, { "category": "external", "summary": "SUSE Bug 1200084 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1200084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.169.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.169.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:03:12Z", "details": "moderate" } ], "title": "CVE-2022-0492" }, { "cve": "CVE-2022-0617", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0617" } ], "notes": [ { "category": "general", "text": "A flaw null pointer dereference in the Linux kernel UDF file system functionality was found in the way user triggers udf_file_write_iter function for the malicious UDF image. A local user could use this flaw to crash the system. Actual from Linux kernel 4.2-rc1 till 5.17-rc2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.169.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0617", "url": "https://www.suse.com/security/cve/CVE-2022-0617" }, { "category": "external", "summary": "SUSE Bug 1196079 for CVE-2022-0617", "url": "https://bugzilla.suse.com/1196079" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.169.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.169.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:03:12Z", "details": "moderate" } ], "title": "CVE-2022-0617" }, { "cve": "CVE-2022-24448", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-24448" } ], "notes": [ { "category": "general", "text": "An issue was discovered in fs/nfs/dir.c in the Linux kernel before 5.16.5. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should occur, but the server instead returns uninitialized data in the file descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.169.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-24448", "url": "https://www.suse.com/security/cve/CVE-2022-24448" }, { "category": "external", "summary": "SUSE Bug 1195612 for CVE-2022-24448", "url": "https://bugzilla.suse.com/1195612" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.169.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.169.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.169.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.169.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:03:12Z", "details": "moderate" } ], "title": "CVE-2022-24448" } ] }
suse-su-2022:0764-1
Vulnerability from csaf_suse
Published
2022-03-09 13:32
Modified
2022-03-09 13:32
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP2 RT kernel was updated to receive various security and bugfixes.
Transient execution side-channel attacks attacking the Branch History Buffer (BHB),
named 'Branch Target Injection' and 'Intra-Mode Branch History Injection' are now mitigated.
The following security bugs were fixed:
- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).
- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).
- CVE-2022-0847: Fixed a vulnerability were a local attackers could overwrite data in arbitrary (read-only) files (bsc#1196584).
The following non-security bugs were fixed:
- btrfs: check for missing device in btrfs_trim_fs (bsc#1195701).
- lib/iov_iter: initialize 'flags' in new pipe_buffer (bsc#1196584).
- nfsd: allow delegation state ids to be revoked and then freed (bsc#1192483).
- nfsd: allow open state ids to be revoked and then freed (bsc#1192483).
- nfsd: do not admin-revoke NSv4.0 state ids (bsc#1192483).
- nfsd: prepare for supporting admin-revocation of state (bsc#1192483).
- powerpc/pseries/ddw: Revert 'Extend upper limit for huge DMA window for persistent memory' (bsc#1195995 ltc#196394).
Patchnames
SUSE-2022-764,SUSE-SLE-Module-RT-15-SP2-2022-764,SUSE-SUSE-MicroOS-5.0-2022-764
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 15 SP2 RT kernel was updated to receive various security and bugfixes.\n\n\nTransient execution side-channel attacks attacking the Branch History Buffer (BHB),\nnamed \u0027Branch Target Injection\u0027 and \u0027Intra-Mode Branch History Injection\u0027 are now mitigated.\n\nThe following security bugs were fixed:\n\n- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).\n- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).\n- CVE-2022-0847: Fixed a vulnerability were a local attackers could overwrite data in arbitrary (read-only) files (bsc#1196584).\n\nThe following non-security bugs were fixed:\n\n- btrfs: check for missing device in btrfs_trim_fs (bsc#1195701).\n- lib/iov_iter: initialize \u0027flags\u0027 in new pipe_buffer (bsc#1196584).\n- nfsd: allow delegation state ids to be revoked and then freed (bsc#1192483).\n- nfsd: allow open state ids to be revoked and then freed (bsc#1192483).\n- nfsd: do not admin-revoke NSv4.0 state ids (bsc#1192483).\n- nfsd: prepare for supporting admin-revocation of state (bsc#1192483).\n- powerpc/pseries/ddw: Revert \u0027Extend upper limit for huge DMA window for persistent memory\u0027 (bsc#1195995 ltc#196394).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-764,SUSE-SLE-Module-RT-15-SP2-2022-764,SUSE-SUSE-MicroOS-5.0-2022-764", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0764-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:0764-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220764-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:0764-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010389.html" }, { "category": "self", "summary": "SUSE Bug 1191580", "url": "https://bugzilla.suse.com/1191580" }, { "category": "self", "summary": "SUSE Bug 1192483", "url": "https://bugzilla.suse.com/1192483" }, { "category": "self", "summary": "SUSE Bug 1195701", "url": "https://bugzilla.suse.com/1195701" }, { "category": "self", "summary": "SUSE Bug 1195995", "url": "https://bugzilla.suse.com/1195995" }, { "category": "self", "summary": "SUSE Bug 1196584", "url": "https://bugzilla.suse.com/1196584" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0001 page", "url": "https://www.suse.com/security/cve/CVE-2022-0001/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0002 page", "url": "https://www.suse.com/security/cve/CVE-2022-0002/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0847 page", "url": "https://www.suse.com/security/cve/CVE-2022-0847/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2022-03-09T13:32:59Z", "generator": { "date": "2022-03-09T13:32:59Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:0764-1", "initial_release_date": "2022-03-09T13:32:59Z", "revision_history": [ { "date": "2022-03-09T13:32:59Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-rt-5.3.18-76.1.noarch", "product": { "name": "kernel-devel-rt-5.3.18-76.1.noarch", "product_id": "kernel-devel-rt-5.3.18-76.1.noarch" } }, { "category": "product_version", "name": "kernel-source-rt-5.3.18-76.1.noarch", "product": { "name": "kernel-source-rt-5.3.18-76.1.noarch", "product_id": "kernel-source-rt-5.3.18-76.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-rt-5.3.18-76.1.x86_64", "product": { "name": "cluster-md-kmp-rt-5.3.18-76.1.x86_64", "product_id": "cluster-md-kmp-rt-5.3.18-76.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-rt_debug-5.3.18-76.1.x86_64", "product": { "name": "cluster-md-kmp-rt_debug-5.3.18-76.1.x86_64", "product_id": "cluster-md-kmp-rt_debug-5.3.18-76.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt-5.3.18-76.1.x86_64", "product": { "name": "dlm-kmp-rt-5.3.18-76.1.x86_64", "product_id": "dlm-kmp-rt-5.3.18-76.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt_debug-5.3.18-76.1.x86_64", "product": { "name": "dlm-kmp-rt_debug-5.3.18-76.1.x86_64", "product_id": "dlm-kmp-rt_debug-5.3.18-76.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt-5.3.18-76.1.x86_64", "product": { "name": "gfs2-kmp-rt-5.3.18-76.1.x86_64", "product_id": "gfs2-kmp-rt-5.3.18-76.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt_debug-5.3.18-76.1.x86_64", "product": { "name": "gfs2-kmp-rt_debug-5.3.18-76.1.x86_64", "product_id": "gfs2-kmp-rt_debug-5.3.18-76.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-5.3.18-76.1.x86_64", "product": { "name": "kernel-rt-5.3.18-76.1.x86_64", "product_id": "kernel-rt-5.3.18-76.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-5.3.18-76.1.x86_64", "product": { "name": "kernel-rt-devel-5.3.18-76.1.x86_64", "product_id": "kernel-rt-devel-5.3.18-76.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-extra-5.3.18-76.1.x86_64", "product": { "name": "kernel-rt-extra-5.3.18-76.1.x86_64", "product_id": "kernel-rt-extra-5.3.18-76.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-livepatch-devel-5.3.18-76.1.x86_64", "product": { "name": "kernel-rt-livepatch-devel-5.3.18-76.1.x86_64", "product_id": "kernel-rt-livepatch-devel-5.3.18-76.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-5.3.18-76.1.x86_64", "product": { "name": "kernel-rt_debug-5.3.18-76.1.x86_64", "product_id": "kernel-rt_debug-5.3.18-76.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-devel-5.3.18-76.1.x86_64", "product": { "name": "kernel-rt_debug-devel-5.3.18-76.1.x86_64", "product_id": "kernel-rt_debug-devel-5.3.18-76.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-extra-5.3.18-76.1.x86_64", "product": { "name": "kernel-rt_debug-extra-5.3.18-76.1.x86_64", "product_id": "kernel-rt_debug-extra-5.3.18-76.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-livepatch-devel-5.3.18-76.1.x86_64", "product": { "name": "kernel-rt_debug-livepatch-devel-5.3.18-76.1.x86_64", "product_id": "kernel-rt_debug-livepatch-devel-5.3.18-76.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-5.3.18-76.1.x86_64", "product": { "name": "kernel-syms-rt-5.3.18-76.1.x86_64", "product_id": "kernel-syms-rt-5.3.18-76.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-rt-5.3.18-76.1.x86_64", "product": { "name": "kselftests-kmp-rt-5.3.18-76.1.x86_64", "product_id": "kselftests-kmp-rt-5.3.18-76.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-rt_debug-5.3.18-76.1.x86_64", "product": { "name": "kselftests-kmp-rt_debug-5.3.18-76.1.x86_64", "product_id": "kselftests-kmp-rt_debug-5.3.18-76.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt-5.3.18-76.1.x86_64", "product": { "name": "ocfs2-kmp-rt-5.3.18-76.1.x86_64", "product_id": "ocfs2-kmp-rt-5.3.18-76.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt_debug-5.3.18-76.1.x86_64", "product": { "name": "ocfs2-kmp-rt_debug-5.3.18-76.1.x86_64", "product_id": "ocfs2-kmp-rt_debug-5.3.18-76.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-rt-5.3.18-76.1.x86_64", "product": { "name": "reiserfs-kmp-rt-5.3.18-76.1.x86_64", "product_id": "reiserfs-kmp-rt-5.3.18-76.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-rt_debug-5.3.18-76.1.x86_64", "product": { "name": "reiserfs-kmp-rt_debug-5.3.18-76.1.x86_64", "product_id": "reiserfs-kmp-rt_debug-5.3.18-76.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Real Time Module 15 SP2", "product": { "name": "SUSE Real Time Module 15 SP2", "product_id": "SUSE Real Time Module 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-rt:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.0", "product": { "name": "SUSE Linux Enterprise Micro 5.0", "product_id": "SUSE Linux Enterprise Micro 5.0", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-microos:5.0" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-rt-5.3.18-76.1.x86_64 as component of SUSE Real Time Module 15 SP2", "product_id": "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-76.1.x86_64" }, "product_reference": "cluster-md-kmp-rt-5.3.18-76.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-rt-5.3.18-76.1.x86_64 as component of SUSE Real Time Module 15 SP2", "product_id": "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-76.1.x86_64" }, "product_reference": "dlm-kmp-rt-5.3.18-76.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-rt-5.3.18-76.1.x86_64 as component of SUSE Real Time Module 15 SP2", "product_id": "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-76.1.x86_64" }, "product_reference": "gfs2-kmp-rt-5.3.18-76.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-rt-5.3.18-76.1.noarch as component of SUSE Real Time Module 15 SP2", "product_id": "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-76.1.noarch" }, "product_reference": "kernel-devel-rt-5.3.18-76.1.noarch", "relates_to_product_reference": "SUSE Real Time Module 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-5.3.18-76.1.x86_64 as component of SUSE Real Time Module 15 SP2", "product_id": "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-76.1.x86_64" }, "product_reference": "kernel-rt-5.3.18-76.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-5.3.18-76.1.x86_64 as component of SUSE Real Time Module 15 SP2", "product_id": "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-76.1.x86_64" }, "product_reference": "kernel-rt-devel-5.3.18-76.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-5.3.18-76.1.x86_64 as component of SUSE Real Time Module 15 SP2", "product_id": "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-76.1.x86_64" }, "product_reference": "kernel-rt_debug-5.3.18-76.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-devel-5.3.18-76.1.x86_64 as component of SUSE Real Time Module 15 SP2", "product_id": "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-76.1.x86_64" }, "product_reference": "kernel-rt_debug-devel-5.3.18-76.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-5.3.18-76.1.noarch as component of SUSE Real Time Module 15 SP2", "product_id": "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-76.1.noarch" }, "product_reference": "kernel-source-rt-5.3.18-76.1.noarch", "relates_to_product_reference": "SUSE Real Time Module 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-5.3.18-76.1.x86_64 as component of SUSE Real Time Module 15 SP2", "product_id": "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-76.1.x86_64" }, "product_reference": "kernel-syms-rt-5.3.18-76.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-rt-5.3.18-76.1.x86_64 as component of SUSE Real Time Module 15 SP2", "product_id": "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-76.1.x86_64" }, "product_reference": "ocfs2-kmp-rt-5.3.18-76.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-5.3.18-76.1.x86_64 as component of SUSE Linux Enterprise Micro 5.0", "product_id": "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-76.1.x86_64" }, "product_reference": "kernel-rt-5.3.18-76.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-0001", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0001" } ], "notes": [ { "category": "general", "text": "Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-76.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-76.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-76.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0001", "url": "https://www.suse.com/security/cve/CVE-2022-0001" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2022-0001", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2022-0001", "url": "https://bugzilla.suse.com/1196901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-76.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-76.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-76.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-76.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-76.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-76.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T13:32:59Z", "details": "moderate" } ], "title": "CVE-2022-0001" }, { "cve": "CVE-2022-0002", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0002" } ], "notes": [ { "category": "general", "text": "Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-76.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-76.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-76.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0002", "url": "https://www.suse.com/security/cve/CVE-2022-0002" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2022-0002", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2022-0002", "url": "https://bugzilla.suse.com/1196901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-76.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-76.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-76.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-76.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-76.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-76.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T13:32:59Z", "details": "moderate" } ], "title": "CVE-2022-0002" }, { "cve": "CVE-2022-0847", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0847" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way the \"flags\" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-76.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-76.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-76.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0847", "url": "https://www.suse.com/security/cve/CVE-2022-0847" }, { "category": "external", "summary": "SUSE Bug 1196584 for CVE-2022-0847", "url": "https://bugzilla.suse.com/1196584" }, { "category": "external", "summary": "SUSE Bug 1196601 for CVE-2022-0847", "url": "https://bugzilla.suse.com/1196601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-76.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-76.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-76.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-76.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-76.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-76.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-76.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T13:32:59Z", "details": "important" } ], "title": "CVE-2022-0847" } ] }
suse-su-2022:14905-1
Vulnerability from csaf_suse
Published
2022-03-08 18:05
Modified
2022-03-08 18:05
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.
Transient execution side-channel attacks attacking the Branch History Buffer (BHB),
named 'Branch Target Injection' and 'Intra-Mode Branch History Injection' are now mitigated.
The following security bugs were fixed:
- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).
- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).
- CVE-2020-12770: Fixed sg_remove_request call in a certain failure cases (bsc#1171420).
- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)
- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
- CVE-2021-45095: Fixed refcount leak in pep_sock_accept in net/phonet/pep.c (bsc#1193867).
- CVE-2021-4155: Fixed a data leak flaw that allows a local attacker to leak data on the XFS filesystem (bsc#1194272).
- CVE-2020-27820: Fixed a vulnerability where a use-after-frees in nouveau's postclose() handler could happen if removing device (bsc#1179599).
- CVE-2019-0136: Fixed an insufficient access control which allow an unauthenticated user to execute a denial of service (bsc#1193157).
- CVE-2021-3753: Fixed race out-of-bounds in virtual terminal handling (bsc#1190025).
The following non-security bugs were fixed:
- kprobes: Limit max data_size of the kretprobe instances (bsc#1193669).
- md: check the return of mddev_find() (bsc#1195109).
Patchnames
slessp4-kernel-14905,slexsp3-kernel-14905
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.\n\n\nTransient execution side-channel attacks attacking the Branch History Buffer (BHB),\nnamed \u0027Branch Target Injection\u0027 and \u0027Intra-Mode Branch History Injection\u0027 are now mitigated.\n\nThe following security bugs were fixed:\n\n- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).\n- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).\n- CVE-2020-12770: Fixed sg_remove_request call in a certain failure cases (bsc#1171420).\n- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)\n- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).\n- CVE-2021-45095: Fixed refcount leak in pep_sock_accept in net/phonet/pep.c (bsc#1193867).\n- CVE-2021-4155: Fixed a data leak flaw that allows a local attacker to leak data on the XFS filesystem (bsc#1194272).\n- CVE-2020-27820: Fixed a vulnerability where a use-after-frees in nouveau\u0027s postclose() handler could happen if removing device (bsc#1179599).\n- CVE-2019-0136: Fixed an insufficient access control which allow an unauthenticated user to execute a denial of service (bsc#1193157).\n- CVE-2021-3753: Fixed race out-of-bounds in virtual terminal handling (bsc#1190025).\n\nThe following non-security bugs were fixed:\n\n- kprobes: Limit max data_size of the kretprobe instances (bsc#1193669).\n- md: check the return of mddev_find() (bsc#1195109).\n", "title": "Description of the patch" }, { "category": "details", "text": "slessp4-kernel-14905,slexsp3-kernel-14905", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_14905-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:14905-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-202214905-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:14905-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010396.html" }, { "category": "self", "summary": "SUSE Bug 1171420", "url": "https://bugzilla.suse.com/1171420" }, { "category": "self", "summary": "SUSE Bug 1179599", "url": "https://bugzilla.suse.com/1179599" }, { "category": "self", "summary": "SUSE Bug 1190025", "url": "https://bugzilla.suse.com/1190025" }, { "category": "self", "summary": "SUSE Bug 1191580", "url": "https://bugzilla.suse.com/1191580" }, { "category": "self", "summary": "SUSE Bug 1193157", "url": "https://bugzilla.suse.com/1193157" }, { "category": "self", "summary": "SUSE Bug 1193669", "url": "https://bugzilla.suse.com/1193669" }, { "category": "self", "summary": "SUSE Bug 1193867", "url": "https://bugzilla.suse.com/1193867" }, { "category": "self", "summary": "SUSE Bug 1194272", "url": "https://bugzilla.suse.com/1194272" }, { "category": "self", "summary": "SUSE Bug 1195109", "url": "https://bugzilla.suse.com/1195109" }, { "category": "self", "summary": "SUSE Bug 1195543", "url": "https://bugzilla.suse.com/1195543" }, { "category": "self", "summary": "SUSE Bug 1195908", "url": "https://bugzilla.suse.com/1195908" }, { "category": "self", "summary": "SUSE Bug 1196079", "url": "https://bugzilla.suse.com/1196079" }, { "category": "self", "summary": "SUSE Bug 1196612", "url": "https://bugzilla.suse.com/1196612" }, { "category": "self", "summary": "SUSE CVE CVE-2019-0136 page", "url": "https://www.suse.com/security/cve/CVE-2019-0136/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12770 page", "url": "https://www.suse.com/security/cve/CVE-2020-12770/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27820 page", "url": "https://www.suse.com/security/cve/CVE-2020-27820/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3753 page", "url": "https://www.suse.com/security/cve/CVE-2021-3753/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-4155 page", "url": "https://www.suse.com/security/cve/CVE-2021-4155/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-45095 page", "url": "https://www.suse.com/security/cve/CVE-2021-45095/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0001 page", "url": "https://www.suse.com/security/cve/CVE-2022-0001/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0002 page", "url": "https://www.suse.com/security/cve/CVE-2022-0002/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0492 page", "url": "https://www.suse.com/security/cve/CVE-2022-0492/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0617 page", "url": "https://www.suse.com/security/cve/CVE-2022-0617/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2022-03-08T18:05:10Z", "generator": { "date": "2022-03-08T18:05:10Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:14905-1", "initial_release_date": "2022-03-08T18:05:10Z", "revision_history": [ { "date": "2022-03-08T18:05:10Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-108.135.1.i586", "product": { "name": "kernel-default-3.0.101-108.135.1.i586", "product_id": "kernel-default-3.0.101-108.135.1.i586" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-108.135.1.i586", "product": { "name": "kernel-default-base-3.0.101-108.135.1.i586", "product_id": "kernel-default-base-3.0.101-108.135.1.i586" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-108.135.1.i586", "product": { "name": "kernel-default-devel-3.0.101-108.135.1.i586", "product_id": "kernel-default-devel-3.0.101-108.135.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-108.135.1.i586", "product": { "name": "kernel-ec2-3.0.101-108.135.1.i586", "product_id": "kernel-ec2-3.0.101-108.135.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-108.135.1.i586", "product": { "name": "kernel-ec2-base-3.0.101-108.135.1.i586", "product_id": "kernel-ec2-base-3.0.101-108.135.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-108.135.1.i586", "product": { "name": "kernel-ec2-devel-3.0.101-108.135.1.i586", "product_id": "kernel-ec2-devel-3.0.101-108.135.1.i586" } }, { "category": "product_version", "name": "kernel-pae-3.0.101-108.135.1.i586", "product": { "name": "kernel-pae-3.0.101-108.135.1.i586", "product_id": "kernel-pae-3.0.101-108.135.1.i586" } }, { "category": "product_version", "name": "kernel-pae-base-3.0.101-108.135.1.i586", "product": { "name": "kernel-pae-base-3.0.101-108.135.1.i586", "product_id": "kernel-pae-base-3.0.101-108.135.1.i586" } }, { "category": "product_version", "name": "kernel-pae-devel-3.0.101-108.135.1.i586", "product": { "name": "kernel-pae-devel-3.0.101-108.135.1.i586", "product_id": "kernel-pae-devel-3.0.101-108.135.1.i586" } }, { "category": "product_version", "name": "kernel-source-3.0.101-108.135.1.i586", "product": { "name": "kernel-source-3.0.101-108.135.1.i586", "product_id": "kernel-source-3.0.101-108.135.1.i586" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-108.135.1.i586", "product": { "name": "kernel-syms-3.0.101-108.135.1.i586", "product_id": "kernel-syms-3.0.101-108.135.1.i586" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-108.135.1.i586", "product": { "name": "kernel-trace-3.0.101-108.135.1.i586", "product_id": "kernel-trace-3.0.101-108.135.1.i586" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-108.135.1.i586", "product": { "name": "kernel-trace-base-3.0.101-108.135.1.i586", "product_id": "kernel-trace-base-3.0.101-108.135.1.i586" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-108.135.1.i586", "product": { "name": "kernel-trace-devel-3.0.101-108.135.1.i586", "product_id": "kernel-trace-devel-3.0.101-108.135.1.i586" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-108.135.1.i586", "product": { "name": "kernel-xen-3.0.101-108.135.1.i586", "product_id": "kernel-xen-3.0.101-108.135.1.i586" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-108.135.1.i586", "product": { "name": "kernel-xen-base-3.0.101-108.135.1.i586", "product_id": "kernel-xen-base-3.0.101-108.135.1.i586" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-108.135.1.i586", "product": { "name": "kernel-xen-devel-3.0.101-108.135.1.i586", "product_id": "kernel-xen-devel-3.0.101-108.135.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "kernel-bigmem-3.0.101-108.135.1.ppc64", "product": { "name": "kernel-bigmem-3.0.101-108.135.1.ppc64", "product_id": "kernel-bigmem-3.0.101-108.135.1.ppc64" } }, { "category": "product_version", "name": "kernel-bigmem-base-3.0.101-108.135.1.ppc64", "product": { "name": "kernel-bigmem-base-3.0.101-108.135.1.ppc64", "product_id": "kernel-bigmem-base-3.0.101-108.135.1.ppc64" } }, { "category": "product_version", "name": "kernel-bigmem-devel-3.0.101-108.135.1.ppc64", "product": { "name": "kernel-bigmem-devel-3.0.101-108.135.1.ppc64", "product_id": "kernel-bigmem-devel-3.0.101-108.135.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-3.0.101-108.135.1.ppc64", "product": { "name": "kernel-default-3.0.101-108.135.1.ppc64", "product_id": "kernel-default-3.0.101-108.135.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-108.135.1.ppc64", "product": { "name": "kernel-default-base-3.0.101-108.135.1.ppc64", "product_id": "kernel-default-base-3.0.101-108.135.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-108.135.1.ppc64", "product": { "name": "kernel-default-devel-3.0.101-108.135.1.ppc64", "product_id": "kernel-default-devel-3.0.101-108.135.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-3.0.101-108.135.1.ppc64", "product": { "name": "kernel-ppc64-3.0.101-108.135.1.ppc64", "product_id": "kernel-ppc64-3.0.101-108.135.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-base-3.0.101-108.135.1.ppc64", "product": { "name": "kernel-ppc64-base-3.0.101-108.135.1.ppc64", "product_id": "kernel-ppc64-base-3.0.101-108.135.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-devel-3.0.101-108.135.1.ppc64", "product": { "name": "kernel-ppc64-devel-3.0.101-108.135.1.ppc64", "product_id": "kernel-ppc64-devel-3.0.101-108.135.1.ppc64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-108.135.1.ppc64", "product": { "name": "kernel-source-3.0.101-108.135.1.ppc64", "product_id": "kernel-source-3.0.101-108.135.1.ppc64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-108.135.1.ppc64", "product": { "name": "kernel-syms-3.0.101-108.135.1.ppc64", "product_id": "kernel-syms-3.0.101-108.135.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-108.135.1.ppc64", "product": { "name": "kernel-trace-3.0.101-108.135.1.ppc64", "product_id": "kernel-trace-3.0.101-108.135.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-108.135.1.ppc64", "product": { "name": "kernel-trace-base-3.0.101-108.135.1.ppc64", "product_id": "kernel-trace-base-3.0.101-108.135.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-108.135.1.ppc64", "product": { "name": "kernel-trace-devel-3.0.101-108.135.1.ppc64", "product_id": "kernel-trace-devel-3.0.101-108.135.1.ppc64" } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-108.135.1.s390x", "product": { "name": "kernel-default-3.0.101-108.135.1.s390x", "product_id": "kernel-default-3.0.101-108.135.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-108.135.1.s390x", "product": { "name": "kernel-default-base-3.0.101-108.135.1.s390x", "product_id": "kernel-default-base-3.0.101-108.135.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-108.135.1.s390x", "product": { "name": "kernel-default-devel-3.0.101-108.135.1.s390x", "product_id": "kernel-default-devel-3.0.101-108.135.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.0.101-108.135.1.s390x", "product": { "name": "kernel-default-man-3.0.101-108.135.1.s390x", "product_id": "kernel-default-man-3.0.101-108.135.1.s390x" } }, { "category": "product_version", "name": "kernel-source-3.0.101-108.135.1.s390x", "product": { "name": "kernel-source-3.0.101-108.135.1.s390x", "product_id": "kernel-source-3.0.101-108.135.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-108.135.1.s390x", "product": { "name": "kernel-syms-3.0.101-108.135.1.s390x", "product_id": "kernel-syms-3.0.101-108.135.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-108.135.1.s390x", "product": { "name": "kernel-trace-3.0.101-108.135.1.s390x", "product_id": "kernel-trace-3.0.101-108.135.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-108.135.1.s390x", "product": { "name": "kernel-trace-base-3.0.101-108.135.1.s390x", "product_id": "kernel-trace-base-3.0.101-108.135.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-108.135.1.s390x", "product": { "name": "kernel-trace-devel-3.0.101-108.135.1.s390x", "product_id": "kernel-trace-devel-3.0.101-108.135.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-108.135.1.x86_64", "product": { "name": "kernel-default-3.0.101-108.135.1.x86_64", "product_id": "kernel-default-3.0.101-108.135.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-108.135.1.x86_64", "product": { "name": "kernel-default-base-3.0.101-108.135.1.x86_64", "product_id": "kernel-default-base-3.0.101-108.135.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-108.135.1.x86_64", "product": { "name": "kernel-default-devel-3.0.101-108.135.1.x86_64", "product_id": "kernel-default-devel-3.0.101-108.135.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-108.135.1.x86_64", "product": { "name": "kernel-ec2-3.0.101-108.135.1.x86_64", "product_id": "kernel-ec2-3.0.101-108.135.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-108.135.1.x86_64", "product": { "name": "kernel-ec2-base-3.0.101-108.135.1.x86_64", "product_id": "kernel-ec2-base-3.0.101-108.135.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-108.135.1.x86_64", "product": { "name": "kernel-ec2-devel-3.0.101-108.135.1.x86_64", "product_id": "kernel-ec2-devel-3.0.101-108.135.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-108.135.1.x86_64", "product": { "name": "kernel-source-3.0.101-108.135.1.x86_64", "product_id": "kernel-source-3.0.101-108.135.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-108.135.1.x86_64", "product": { "name": "kernel-syms-3.0.101-108.135.1.x86_64", "product_id": "kernel-syms-3.0.101-108.135.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-108.135.1.x86_64", "product": { "name": "kernel-trace-3.0.101-108.135.1.x86_64", "product_id": "kernel-trace-3.0.101-108.135.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-108.135.1.x86_64", "product": { "name": "kernel-trace-base-3.0.101-108.135.1.x86_64", "product_id": "kernel-trace-base-3.0.101-108.135.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-108.135.1.x86_64", "product": { "name": "kernel-trace-devel-3.0.101-108.135.1.x86_64", "product_id": "kernel-trace-devel-3.0.101-108.135.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-108.135.1.x86_64", "product": { "name": "kernel-xen-3.0.101-108.135.1.x86_64", "product_id": "kernel-xen-3.0.101-108.135.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-108.135.1.x86_64", "product": { "name": "kernel-xen-base-3.0.101-108.135.1.x86_64", "product_id": "kernel-xen-base-3.0.101-108.135.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-108.135.1.x86_64", "product": { "name": "kernel-xen-devel-3.0.101-108.135.1.x86_64", "product_id": "kernel-xen-devel-3.0.101-108.135.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-3.0.101-108.135.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.135.1.ppc64" }, "product_reference": "kernel-bigmem-3.0.101-108.135.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-base-3.0.101-108.135.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.135.1.ppc64" }, "product_reference": "kernel-bigmem-base-3.0.101-108.135.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-devel-3.0.101-108.135.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.135.1.ppc64" }, "product_reference": "kernel-bigmem-devel-3.0.101-108.135.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.135.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.i586" }, "product_reference": "kernel-default-3.0.101-108.135.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.135.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.ppc64" }, "product_reference": "kernel-default-3.0.101-108.135.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.135.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.s390x" }, "product_reference": "kernel-default-3.0.101-108.135.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.135.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.x86_64" }, "product_reference": "kernel-default-3.0.101-108.135.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.135.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.i586" }, "product_reference": "kernel-default-base-3.0.101-108.135.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.135.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.ppc64" }, "product_reference": "kernel-default-base-3.0.101-108.135.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.135.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-108.135.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.135.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-108.135.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.135.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-108.135.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.135.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.ppc64" }, "product_reference": "kernel-default-devel-3.0.101-108.135.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.135.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-108.135.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.135.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-108.135.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-108.135.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.135.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-108.135.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-108.135.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.135.1.i586" }, "product_reference": "kernel-ec2-3.0.101-108.135.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-108.135.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.135.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-108.135.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-108.135.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.135.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-108.135.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-108.135.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.135.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-108.135.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-108.135.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.135.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-108.135.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-108.135.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.135.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-108.135.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-108.135.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.135.1.i586" }, "product_reference": "kernel-pae-3.0.101-108.135.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-108.135.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.135.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-108.135.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-108.135.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.135.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-108.135.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-3.0.101-108.135.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.135.1.ppc64" }, "product_reference": "kernel-ppc64-3.0.101-108.135.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-base-3.0.101-108.135.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.135.1.ppc64" }, "product_reference": "kernel-ppc64-base-3.0.101-108.135.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-devel-3.0.101-108.135.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.135.1.ppc64" }, "product_reference": "kernel-ppc64-devel-3.0.101-108.135.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.135.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.i586" }, "product_reference": "kernel-source-3.0.101-108.135.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.135.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.ppc64" }, "product_reference": "kernel-source-3.0.101-108.135.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.135.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.s390x" }, "product_reference": "kernel-source-3.0.101-108.135.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.135.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.x86_64" }, "product_reference": "kernel-source-3.0.101-108.135.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.135.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.i586" }, "product_reference": "kernel-syms-3.0.101-108.135.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.135.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.ppc64" }, "product_reference": "kernel-syms-3.0.101-108.135.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.135.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.s390x" }, "product_reference": "kernel-syms-3.0.101-108.135.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.135.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-108.135.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.135.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.i586" }, "product_reference": "kernel-trace-3.0.101-108.135.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.135.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.ppc64" }, "product_reference": "kernel-trace-3.0.101-108.135.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.135.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.s390x" }, "product_reference": "kernel-trace-3.0.101-108.135.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.135.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-108.135.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.135.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-108.135.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.135.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.ppc64" }, "product_reference": "kernel-trace-base-3.0.101-108.135.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.135.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-108.135.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.135.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-108.135.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.135.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-108.135.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.135.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.ppc64" }, "product_reference": "kernel-trace-devel-3.0.101-108.135.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.135.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-108.135.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.135.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-108.135.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-108.135.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.135.1.i586" }, "product_reference": "kernel-xen-3.0.101-108.135.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-108.135.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.135.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-108.135.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-108.135.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.135.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-108.135.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-108.135.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.135.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-108.135.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-108.135.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.135.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-108.135.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-108.135.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.135.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-108.135.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-0136", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-0136" } ], "notes": [ { "category": "general", "text": "Insufficient access control in the Intel(R) PROSet/Wireless WiFi Software driver before version 21.10 may allow an unauthenticated user to potentially enable denial of service via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.135.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-0136", "url": "https://www.suse.com/security/cve/CVE-2019-0136" }, { "category": "external", "summary": "SUSE Bug 1193157 for CVE-2019-0136", "url": "https://bugzilla.suse.com/1193157" }, { "category": "external", "summary": "SUSE Bug 1199615 for CVE-2019-0136", "url": "https://bugzilla.suse.com/1199615" }, { "category": "external", "summary": "SUSE Bug 1199616 for CVE-2019-0136", "url": "https://bugzilla.suse.com/1199616" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.135.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.135.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:05:10Z", "details": "important" } ], "title": "CVE-2019-0136" }, { "cve": "CVE-2020-12770", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12770" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.6.11. sg_write lacks an sg_remove_request call in a certain failure case, aka CID-83c6f2390040.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.135.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12770", "url": "https://www.suse.com/security/cve/CVE-2020-12770" }, { "category": "external", "summary": "SUSE Bug 1171420 for CVE-2020-12770", "url": "https://bugzilla.suse.com/1171420" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.135.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.135.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:05:10Z", "details": "moderate" } ], "title": "CVE-2020-12770" }, { "cve": "CVE-2020-27820", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27820" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in Linux kernel, where a use-after-frees in nouveau\u0027s postclose() handler could happen if removing device (that is not common to remove video card physically without power-off, but same happens if \"unbind\" the driver).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.135.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27820", "url": "https://www.suse.com/security/cve/CVE-2020-27820" }, { "category": "external", "summary": "SUSE Bug 1179599 for CVE-2020-27820", "url": "https://bugzilla.suse.com/1179599" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.135.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.135.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:05:10Z", "details": "low" } ], "title": "CVE-2020-27820" }, { "cve": "CVE-2021-3753", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3753" } ], "notes": [ { "category": "general", "text": "A race problem was seen in the vt_k_ioctl in drivers/tty/vt/vt_ioctl.c in the Linux kernel, which may cause an out of bounds read in vt as the write access to vc_mode is not protected by lock-in vt_ioctl (KDSETMDE). The highest threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.135.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3753", "url": "https://www.suse.com/security/cve/CVE-2021-3753" }, { "category": "external", "summary": "SUSE Bug 1190025 for CVE-2021-3753", "url": "https://bugzilla.suse.com/1190025" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.135.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.135.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:05:10Z", "details": "low" } ], "title": "CVE-2021-3753" }, { "cve": "CVE-2021-4155", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-4155" } ], "notes": [ { "category": "general", "text": "A data leak flaw was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem allowed for size increase of files with unaligned size. A local attacker could use this flaw to leak data on the XFS filesystem otherwise not accessible to them.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.135.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-4155", "url": "https://www.suse.com/security/cve/CVE-2021-4155" }, { "category": "external", "summary": "SUSE Bug 1194272 for CVE-2021-4155", "url": "https://bugzilla.suse.com/1194272" }, { "category": "external", "summary": "SUSE Bug 1199255 for CVE-2021-4155", "url": "https://bugzilla.suse.com/1199255" }, { "category": "external", "summary": "SUSE Bug 1200084 for CVE-2021-4155", "url": "https://bugzilla.suse.com/1200084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.135.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.135.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:05:10Z", "details": "moderate" } ], "title": "CVE-2021-4155" }, { "cve": "CVE-2021-45095", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-45095" } ], "notes": [ { "category": "general", "text": "pep_sock_accept in net/phonet/pep.c in the Linux kernel through 5.15.8 has a refcount leak.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.135.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-45095", "url": "https://www.suse.com/security/cve/CVE-2021-45095" }, { "category": "external", "summary": "SUSE Bug 1193867 for CVE-2021-45095", "url": "https://bugzilla.suse.com/1193867" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.135.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.135.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:05:10Z", "details": "moderate" } ], "title": "CVE-2021-45095" }, { "cve": "CVE-2022-0001", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0001" } ], "notes": [ { "category": "general", "text": "Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.135.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0001", "url": "https://www.suse.com/security/cve/CVE-2022-0001" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2022-0001", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2022-0001", "url": "https://bugzilla.suse.com/1196901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.135.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.135.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:05:10Z", "details": "moderate" } ], "title": "CVE-2022-0001" }, { "cve": "CVE-2022-0002", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0002" } ], "notes": [ { "category": "general", "text": "Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.135.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0002", "url": "https://www.suse.com/security/cve/CVE-2022-0002" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2022-0002", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2022-0002", "url": "https://bugzilla.suse.com/1196901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.135.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.135.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:05:10Z", "details": "moderate" } ], "title": "CVE-2022-0002" }, { "cve": "CVE-2022-0492", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0492" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in the Linux kernel\u0027s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.135.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0492", "url": "https://www.suse.com/security/cve/CVE-2022-0492" }, { "category": "external", "summary": "SUSE Bug 1195543 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1195543" }, { "category": "external", "summary": "SUSE Bug 1195908 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1195908" }, { "category": "external", "summary": "SUSE Bug 1196612 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1196612" }, { "category": "external", "summary": "SUSE Bug 1196776 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1196776" }, { "category": "external", "summary": "SUSE Bug 1198615 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1198615" }, { "category": "external", "summary": "SUSE Bug 1199255 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1199255" }, { "category": "external", "summary": "SUSE Bug 1199615 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1199615" }, { "category": "external", "summary": "SUSE Bug 1200084 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1200084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.135.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.135.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:05:10Z", "details": "moderate" } ], "title": "CVE-2022-0492" }, { "cve": "CVE-2022-0617", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0617" } ], "notes": [ { "category": "general", "text": "A flaw null pointer dereference in the Linux kernel UDF file system functionality was found in the way user triggers udf_file_write_iter function for the malicious UDF image. A local user could use this flaw to crash the system. Actual from Linux kernel 4.2-rc1 till 5.17-rc2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.135.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0617", "url": "https://www.suse.com/security/cve/CVE-2022-0617" }, { "category": "external", "summary": "SUSE Bug 1196079 for CVE-2022-0617", "url": "https://bugzilla.suse.com/1196079" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.135.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.135.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.135.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.135.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:05:10Z", "details": "moderate" } ], "title": "CVE-2022-0617" } ] }
suse-su-2022:0765-1
Vulnerability from csaf_suse
Published
2022-04-07 08:11
Modified
2022-04-07 08:11
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP5 Azure kernel was updated to receive various security and bugfixes.
Transient execution side-channel attacks attacking the Branch History Buffer (BHB),
named 'Branch Target Injection' and 'Intra-Mode Branch History Injection' are now mitigated.
The following security bugs were fixed:
- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).
- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).
- CVE-2022-0847: Fixed a vulnerability were a local attackers could overwrite data in arbitrary (read-only) files (bsc#1196584).
- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)
- CVE-2022-0644: Fixed a denial of service by a local user. A assertion failure could be triggered in kernel_read_file_from_fd() (bsc#1196155).
- CVE-2021-44879: In gc_data_segment() in fs/f2fs/gc.c, special files were not considered, which lead to a move_data_page NULL pointer dereference (bsc#1195987).
- CVE-2022-24959: Fixed a memory leak in yam_siocdevprivate() in drivers/net/hamradio/yam.c (bsc#1195897).
- CVE-2021-45095: Fixed refcount leak in pep_sock_accept in net/phonet/pep.c (bsc#1193867).
- CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).
- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
- CVE-2022-24448: Fixed an issue in fs/nfs/dir.c. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).
The following non-security bugs were fixed:
- Bluetooth: bfusb: fix division by zero in send path (git-fixes).
- Bluetooth: fix the erroneous flush_work() order (git-fixes).
- EDAC/xgene: Fix deferred probing (bsc#1114648).
- IB/rdmavt: Validate remote_addr during loopback atomic tests (bsc#1114685).
- NFSv4.x: by default serialize open/close operations (bsc#1114893 bsc#1195934). Make this work-around optional
- NFSv42: Do not fail clone() unless the OP_CLONE operation failed (git-fixes).
- NFSv42: Fix pagecache invalidation after COPY/CLONE (git-fixes).
- NFSv4: Handle case where the lookup of a directory fails (git-fixes).
- NFSv4: nfs_atomic_open() can race when looking up a non-regular file (git-fixes).
- PCI: Add function 1 DMA alias quirk for Marvell 88SE9125 SATA controller (git-fixes).
- RDMA/bnxt_re: Fix query SRQ failure (bsc#1050244).
- RDMA/mlx5: Set user priority for DCT (bsc#1103991).
- RDMA/netlink: Add __maybe_unused to static inline in C file (bsc#1046306).
- Replace with an alternative fix for bsc#1185377
- crypto: af_alg - get_page upon reassignment to TX SGL (bsc#1195840).
- cxgb4: fix eeprom len when diagnostics not implemented (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).
- e1000e: Fix packet loss on Tiger Lake and later (bsc#1158533).
- ext4: avoid trim error on fs with small groups (bsc#1191271).
- fuse: annotate lock in fuse_reverse_inval_entry() (bsc#1195795).
- gve: Add RX context (bsc#1191655).
- gve: Add a jumbo-frame device option (bsc#1191655).
- gve: Add consumed counts to ethtool stats (bsc#1191655).
- gve: Add netif_set_xps_queue call (bsc#1191655).
- gve: Add optional metadata descriptor type GVE_TXD_MTD (bsc#1191655).
- gve: Add rx buffer pagecnt bias (bsc#1191655).
- gve: Allow pageflips on larger pages (bsc#1191655).
- gve: Avoid freeing NULL pointer (bsc#1191655).
- gve: Correct available tx qpl check (bsc#1191655).
- gve: Correct order of processing device options (bsc#1191655).
- gve: DQO: avoid unused variable warnings (bsc#1191655).
- gve: Do lazy cleanup in TX path (bsc#1191655).
- gve: Fix GFP flags when allocing pages (bsc#1191655).
- gve: Implement packet continuation for RX (bsc#1191655).
- gve: Implement suspend/resume/shutdown (bsc#1191655).
- gve: Move the irq db indexes out of the ntfy block struct (bsc#1191655).
- gve: Properly handle errors in gve_assign_qpl (bsc#1191655).
- gve: Recording rx queue before sending to napi (bsc#1191655).
- gve: Switch to use napi_complete_done (bsc#1191655).
- gve: Track RX buffer allocation failures (bsc#1191655).
- gve: Update gve_free_queue_page_list signature (bsc#1191655).
- gve: Use kvcalloc() instead of kvzalloc() (bsc#1191655).
- gve: fix for null pointer dereference (bsc#1191655).
- gve: fix gve_get_stats() (bsc#1191655).
- gve: fix the wrong AdminQ buffer queue index check (bsc#1191655).
- gve: fix unmatched u64_stats_update_end() (bsc#1191655).
- gve: remove memory barrier around seqno (bsc#1191655).
- gve: report 64bit tx_bytes counter from gve_handle_report_stats() (bsc#1191655).
- i40e: Fix changing previously set num_queue_pairs for PFs (bsc#1094978).
- i40e: Fix correct max_pkt_size on VF RX queue (bsc#1101816 ).
- i40e: Fix creation of first queue by omitting it if is not power of two (bsc#1101816).
- i40e: Fix display error code in dmesg (bsc#1109837 bsc#1111981 ).
- i40e: Fix for displaying message regarding NVM version (jsc#SLE-4797).
- i40e: Fix freeing of uninitialized misc IRQ vector (bsc#1101816 ).
- i40e: Fix ping is lost after configuring ADq on VF (bsc#1094978).
- i40e: Fix pre-set max number of queues for VF (bsc#1111981 ).
- i40e: Increase delay to 1 s after global EMP reset (bsc#1101816 ).
- iavf: Fix limit of total number of queues to active queues of VF (bsc#1111981).
- iavf: prevent accidental free of filter structure (bsc#1111981 ).
- ibmvnic: Allow queueing resets during probe (bsc#1196516 ltc#196391).
- ibmvnic: Update driver return codes (bsc#1196516 ltc#196391).
- ibmvnic: clear fop when retrying probe (bsc#1196516 ltc#196391).
- ibmvnic: complete init_done on transport events (bsc#1196516 ltc#196391).
- ibmvnic: define flush_reset_queue helper (bsc#1196516 ltc#196391).
- ibmvnic: free reset-work-item when flushing (bsc#1196516 ltc#196391).
- ibmvnic: init init_done_rc earlier (bsc#1196516 ltc#196391).
- ibmvnic: initialize rc before completing wait (bsc#1196516 ltc#196391).
- ibmvnic: register netdev after init of adapter (bsc#1196516 ltc#196391).
- ibmvnic: schedule failover only if vioctl fails (bsc#1196400 ltc#195815).
- ice: Delete always true check of PF pointer (bsc#1118661 ).
- ice: ignore dropped packets during init (bsc#1118661 ).
- igb: Fix removal of unicast MAC filters of VFs (bsc#1117495).
- ixgbevf: Require large buffers for build_skb on 82599VF (bsc#1101674).
- kabi: Hide changes to s390/AP structures (jsc#SLE-20809).
- lib/iov_iter: initialize 'flags' in new pipe_buffer (bsc#1196584).
- mqprio: Correct stats in mqprio_dump_class_stats() (bsc#1109837).
- net/ibmvnic: Cleanup workaround doing an EOI after partition migration (bsc#1089644 ltc#166495 ltc#165544 git-fixes).
- net: Prevent infinite while loop in skb_tx_hash() (bsc#1109837).
- net: ena: Fix error handling when calculating max IO queues number (bsc#1174852).
- net: ena: Fix undefined state when tx request id is out of bounds (bsc#1174852).
- net: marvell: mvpp2: Fix the computation of shared CPUs (bsc#1119113).
- net: phylink: avoid mvneta warning when setting pause parameters (bsc#1119113).
- net: usb: pegasus: Do not drop long Ethernet frames (git-fixes).
- nfsd: fix use-after-free due to delegation race (git-fixes).
- phylib: fix potential use-after-free (bsc#1119113).
- platform/mellanox: mlxreg-io: Fix argument base in kstrtou32() call (bsc#1112374).
- powerpc/64s: Fix debugfs_simple_attr.cocci warnings (bsc#1157038 bsc#1157923 ltc#182612 git-fixes).
- powerpc/pseries/ddw: Revert 'Extend upper limit for huge DMA window for persistent memory' (bsc#1195995 ltc#196394).
- powerpc/pseries: read the lpar name from the firmware (bsc#1187716 ltc#193451).
- powerpc: add link stack flush mitigation status in debugfs (bsc#1157038 bsc#1157923 ltc#182612 git-fixes).
- qed: Handle management FW error (git-fixes).
- qed: rdma - do not wait for resources under hw error recovery flow (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- rndis_host: support Hytera digital radios (git-fixes).
- s390/AP: support new dynamic AP bus size limit (jsc#SLE-20809).
- s390/ap: rework crypto config info and default domain code (jsc#SLE-20809).
- s390/cpumf: Support for CPU Measurement Facility CSVN 7 (bsc#1195080 LTC#196090).
- s390/cpumf: Support for CPU Measurement Sampling Facility LS bit (bsc#1195080 LTC#196090).
- s390/hypfs: include z/VM guests with access control group set (bsc#1195638 LTC#196354).
- scsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put() (git-fixes).
- scsi: lpfc: Fix pt2pt NVMe PRLI reject LOGO loop (bsc#1189126).
- scsi: lpfc: Terminate string in lpfc_debugfs_nvmeio_trc_write() (git-fixes).
- scsi: nsp_cs: Check of ioremap return value (git-fixes).
- scsi: qedf: Fix potential dereference of NULL pointer (git-fixes).
- scsi: qla2xxx: Add devids and conditionals for 28xx (bsc#1195823).
- scsi: qla2xxx: Add ql2xnvme_queues module param to configure number of NVMe queues (bsc#1195823).
- scsi: qla2xxx: Add qla2x00_async_done() for async routines (bsc#1195823).
- scsi: qla2xxx: Add retry for exec firmware (bsc#1195823).
- scsi: qla2xxx: Check for firmware dump already collected (bsc#1195823).
- scsi: qla2xxx: Fix T10 PI tag escape and IP guard options for 28XX adapters (bsc#1195823).
- scsi: qla2xxx: Fix device reconnect in loop topology (bsc#1195823).
- scsi: qla2xxx: Fix premature hw access after PCI error (bsc#1195823).
- scsi: qla2xxx: Fix scheduling while atomic (bsc#1195823).
- scsi: qla2xxx: Fix stuck session in gpdb (bsc#1195823).
- scsi: qla2xxx: Fix unmap of already freed sgl (bsc#1195823).
- scsi: qla2xxx: Fix warning for missing error code (bsc#1195823).
- scsi: qla2xxx: Fix warning message due to adisc being flushed (bsc#1195823).
- scsi: qla2xxx: Fix wrong FDMI data for 64G adapter (bsc#1195823).
- scsi: qla2xxx: Implement ref count for SRB (bsc#1195823).
- scsi: qla2xxx: Refactor asynchronous command initialization (bsc#1195823).
- scsi: qla2xxx: Remove a declaration (bsc#1195823).
- scsi: qla2xxx: Remove unused qla_sess_op_cmd_list from scsi_qla_host_t (bsc#1195823).
- scsi: qla2xxx: Return -ENOMEM if kzalloc() fails (bsc#1195823).
- scsi: qla2xxx: Suppress a kernel complaint in qla_create_qpair() (bsc#1195823).
- scsi: qla2xxx: Update version to 10.02.07.200-k (bsc#1195823).
- scsi: qla2xxx: Update version to 10.02.07.300-k (bsc#1195823).
- scsi: qla2xxx: edif: Fix clang warning (bsc#1195823).
- scsi: qla2xxx: edif: Fix inconsistent check of db_flags (bsc#1195823).
- scsi: qla2xxx: edif: Reduce connection thrash (bsc#1195823).
- scsi: qla2xxx: edif: Replace list_for_each_safe with list_for_each_entry_safe (bsc#1195823).
- scsi: qla2xxx: edif: Tweak trace message (bsc#1195823).
- scsi: scsi_debug: Sanity check block descriptor length in resp_mode_select() (git-fixes).
- scsi: ufs: Fix race conditions related to driver data (git-fixes).
- scsi: zfcp: Fix failed recovery on gone remote port with non-NPIV FCP devices (bsc#1195377 LTC#196245).
- sunrpc/auth_gss: support timeout on gss upcalls (bsc#1193857).
- tracing: Dump stacktrace trigger to the corresponding instance (git-fixes).
- tracing: Have traceon and traceoff trigger honor the instance (git-fixes).
- usb: common: ulpi: Fix crash in ulpi_match() (git-fixes).
- usb: typec: tcpm: Do not disconnect while receiving VBUS off (git-fixes).
- xfrm: fix MTU regression (bsc#1185377, bsc#1194048).
Patchnames
SUSE-2022-765,SUSE-SLE-SERVER-12-SP5-2022-765
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 12 SP5 Azure kernel was updated to receive various security and bugfixes.\n\n\nTransient execution side-channel attacks attacking the Branch History Buffer (BHB),\nnamed \u0027Branch Target Injection\u0027 and \u0027Intra-Mode Branch History Injection\u0027 are now mitigated.\n\nThe following security bugs were fixed:\n\n- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).\n- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).\n- CVE-2022-0847: Fixed a vulnerability were a local attackers could overwrite data in arbitrary (read-only) files (bsc#1196584).\n- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)\n- CVE-2022-0644: Fixed a denial of service by a local user. A assertion failure could be triggered in kernel_read_file_from_fd() (bsc#1196155).\n- CVE-2021-44879: In gc_data_segment() in fs/f2fs/gc.c, special files were not considered, which lead to a move_data_page NULL pointer dereference (bsc#1195987).\n- CVE-2022-24959: Fixed a memory leak in yam_siocdevprivate() in drivers/net/hamradio/yam.c (bsc#1195897).\n- CVE-2021-45095: Fixed refcount leak in pep_sock_accept in net/phonet/pep.c (bsc#1193867).\n- CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).\n- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).\n- CVE-2022-24448: Fixed an issue in fs/nfs/dir.c. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).\n\nThe following non-security bugs were fixed:\n\n- Bluetooth: bfusb: fix division by zero in send path (git-fixes).\n- Bluetooth: fix the erroneous flush_work() order (git-fixes).\n- EDAC/xgene: Fix deferred probing (bsc#1114648).\n- IB/rdmavt: Validate remote_addr during loopback atomic tests (bsc#1114685).\n- NFSv4.x: by default serialize open/close operations (bsc#1114893 bsc#1195934). Make this work-around optional\n- NFSv42: Do not fail clone() unless the OP_CLONE operation failed (git-fixes).\n- NFSv42: Fix pagecache invalidation after COPY/CLONE (git-fixes).\n- NFSv4: Handle case where the lookup of a directory fails (git-fixes).\n- NFSv4: nfs_atomic_open() can race when looking up a non-regular file (git-fixes).\n- PCI: Add function 1 DMA alias quirk for Marvell 88SE9125 SATA controller (git-fixes).\n- RDMA/bnxt_re: Fix query SRQ failure (bsc#1050244).\n- RDMA/mlx5: Set user priority for DCT (bsc#1103991).\n- RDMA/netlink: Add __maybe_unused to static inline in C file (bsc#1046306).\n- Replace with an alternative fix for bsc#1185377\n- crypto: af_alg - get_page upon reassignment to TX SGL (bsc#1195840).\n- cxgb4: fix eeprom len when diagnostics not implemented (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- e1000e: Fix packet loss on Tiger Lake and later (bsc#1158533).\n- ext4: avoid trim error on fs with small groups (bsc#1191271).\n- fuse: annotate lock in fuse_reverse_inval_entry() (bsc#1195795).\n- gve: Add RX context (bsc#1191655).\n- gve: Add a jumbo-frame device option (bsc#1191655).\n- gve: Add consumed counts to ethtool stats (bsc#1191655).\n- gve: Add netif_set_xps_queue call (bsc#1191655).\n- gve: Add optional metadata descriptor type GVE_TXD_MTD (bsc#1191655).\n- gve: Add rx buffer pagecnt bias (bsc#1191655).\n- gve: Allow pageflips on larger pages (bsc#1191655).\n- gve: Avoid freeing NULL pointer (bsc#1191655).\n- gve: Correct available tx qpl check (bsc#1191655).\n- gve: Correct order of processing device options (bsc#1191655).\n- gve: DQO: avoid unused variable warnings (bsc#1191655).\n- gve: Do lazy cleanup in TX path (bsc#1191655).\n- gve: Fix GFP flags when allocing pages (bsc#1191655).\n- gve: Implement packet continuation for RX (bsc#1191655).\n- gve: Implement suspend/resume/shutdown (bsc#1191655).\n- gve: Move the irq db indexes out of the ntfy block struct (bsc#1191655).\n- gve: Properly handle errors in gve_assign_qpl (bsc#1191655).\n- gve: Recording rx queue before sending to napi (bsc#1191655).\n- gve: Switch to use napi_complete_done (bsc#1191655).\n- gve: Track RX buffer allocation failures (bsc#1191655).\n- gve: Update gve_free_queue_page_list signature (bsc#1191655).\n- gve: Use kvcalloc() instead of kvzalloc() (bsc#1191655).\n- gve: fix for null pointer dereference (bsc#1191655).\n- gve: fix gve_get_stats() (bsc#1191655).\n- gve: fix the wrong AdminQ buffer queue index check (bsc#1191655).\n- gve: fix unmatched u64_stats_update_end() (bsc#1191655).\n- gve: remove memory barrier around seqno (bsc#1191655).\n- gve: report 64bit tx_bytes counter from gve_handle_report_stats() (bsc#1191655).\n- i40e: Fix changing previously set num_queue_pairs for PFs (bsc#1094978).\n- i40e: Fix correct max_pkt_size on VF RX queue (bsc#1101816 ).\n- i40e: Fix creation of first queue by omitting it if is not power of two (bsc#1101816).\n- i40e: Fix display error code in dmesg (bsc#1109837 bsc#1111981 ).\n- i40e: Fix for displaying message regarding NVM version (jsc#SLE-4797).\n- i40e: Fix freeing of uninitialized misc IRQ vector (bsc#1101816 ).\n- i40e: Fix ping is lost after configuring ADq on VF (bsc#1094978).\n- i40e: Fix pre-set max number of queues for VF (bsc#1111981 ).\n- i40e: Increase delay to 1 s after global EMP reset (bsc#1101816 ).\n- iavf: Fix limit of total number of queues to active queues of VF (bsc#1111981).\n- iavf: prevent accidental free of filter structure (bsc#1111981 ).\n- ibmvnic: Allow queueing resets during probe (bsc#1196516 ltc#196391).\n- ibmvnic: Update driver return codes (bsc#1196516 ltc#196391).\n- ibmvnic: clear fop when retrying probe (bsc#1196516 ltc#196391).\n- ibmvnic: complete init_done on transport events (bsc#1196516 ltc#196391).\n- ibmvnic: define flush_reset_queue helper (bsc#1196516 ltc#196391).\n- ibmvnic: free reset-work-item when flushing (bsc#1196516 ltc#196391).\n- ibmvnic: init init_done_rc earlier (bsc#1196516 ltc#196391).\n- ibmvnic: initialize rc before completing wait (bsc#1196516 ltc#196391).\n- ibmvnic: register netdev after init of adapter (bsc#1196516 ltc#196391).\n- ibmvnic: schedule failover only if vioctl fails (bsc#1196400 ltc#195815).\n- ice: Delete always true check of PF pointer (bsc#1118661 ).\n- ice: ignore dropped packets during init (bsc#1118661 ).\n- igb: Fix removal of unicast MAC filters of VFs (bsc#1117495).\n- ixgbevf: Require large buffers for build_skb on 82599VF (bsc#1101674).\n- kabi: Hide changes to s390/AP structures (jsc#SLE-20809).\n- lib/iov_iter: initialize \u0027flags\u0027 in new pipe_buffer (bsc#1196584).\n- mqprio: Correct stats in mqprio_dump_class_stats() (bsc#1109837).\n- net/ibmvnic: Cleanup workaround doing an EOI after partition migration (bsc#1089644 ltc#166495 ltc#165544 git-fixes).\n- net: Prevent infinite while loop in skb_tx_hash() (bsc#1109837).\n- net: ena: Fix error handling when calculating max IO queues number (bsc#1174852).\n- net: ena: Fix undefined state when tx request id is out of bounds (bsc#1174852).\n- net: marvell: mvpp2: Fix the computation of shared CPUs (bsc#1119113).\n- net: phylink: avoid mvneta warning when setting pause parameters (bsc#1119113).\n- net: usb: pegasus: Do not drop long Ethernet frames (git-fixes).\n- nfsd: fix use-after-free due to delegation race (git-fixes).\n- phylib: fix potential use-after-free (bsc#1119113).\n- platform/mellanox: mlxreg-io: Fix argument base in kstrtou32() call (bsc#1112374).\n- powerpc/64s: Fix debugfs_simple_attr.cocci warnings (bsc#1157038 bsc#1157923 ltc#182612 git-fixes).\n- powerpc/pseries/ddw: Revert \u0027Extend upper limit for huge DMA window for persistent memory\u0027 (bsc#1195995 ltc#196394).\n- powerpc/pseries: read the lpar name from the firmware (bsc#1187716 ltc#193451).\n- powerpc: add link stack flush mitigation status in debugfs (bsc#1157038 bsc#1157923 ltc#182612 git-fixes).\n- qed: Handle management FW error (git-fixes).\n- qed: rdma - do not wait for resources under hw error recovery flow (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- rndis_host: support Hytera digital radios (git-fixes).\n- s390/AP: support new dynamic AP bus size limit (jsc#SLE-20809).\n- s390/ap: rework crypto config info and default domain code (jsc#SLE-20809).\n- s390/cpumf: Support for CPU Measurement Facility CSVN 7 (bsc#1195080 LTC#196090).\n- s390/cpumf: Support for CPU Measurement Sampling Facility LS bit (bsc#1195080 LTC#196090).\n- s390/hypfs: include z/VM guests with access control group set (bsc#1195638 LTC#196354).\n- scsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put() (git-fixes).\n- scsi: lpfc: Fix pt2pt NVMe PRLI reject LOGO loop (bsc#1189126).\n- scsi: lpfc: Terminate string in lpfc_debugfs_nvmeio_trc_write() (git-fixes).\n- scsi: nsp_cs: Check of ioremap return value (git-fixes).\n- scsi: qedf: Fix potential dereference of NULL pointer (git-fixes).\n- scsi: qla2xxx: Add devids and conditionals for 28xx (bsc#1195823).\n- scsi: qla2xxx: Add ql2xnvme_queues module param to configure number of NVMe queues (bsc#1195823).\n- scsi: qla2xxx: Add qla2x00_async_done() for async routines (bsc#1195823).\n- scsi: qla2xxx: Add retry for exec firmware (bsc#1195823).\n- scsi: qla2xxx: Check for firmware dump already collected (bsc#1195823).\n- scsi: qla2xxx: Fix T10 PI tag escape and IP guard options for 28XX adapters (bsc#1195823).\n- scsi: qla2xxx: Fix device reconnect in loop topology (bsc#1195823).\n- scsi: qla2xxx: Fix premature hw access after PCI error (bsc#1195823).\n- scsi: qla2xxx: Fix scheduling while atomic (bsc#1195823).\n- scsi: qla2xxx: Fix stuck session in gpdb (bsc#1195823).\n- scsi: qla2xxx: Fix unmap of already freed sgl (bsc#1195823).\n- scsi: qla2xxx: Fix warning for missing error code (bsc#1195823).\n- scsi: qla2xxx: Fix warning message due to adisc being flushed (bsc#1195823).\n- scsi: qla2xxx: Fix wrong FDMI data for 64G adapter (bsc#1195823).\n- scsi: qla2xxx: Implement ref count for SRB (bsc#1195823).\n- scsi: qla2xxx: Refactor asynchronous command initialization (bsc#1195823).\n- scsi: qla2xxx: Remove a declaration (bsc#1195823).\n- scsi: qla2xxx: Remove unused qla_sess_op_cmd_list from scsi_qla_host_t (bsc#1195823).\n- scsi: qla2xxx: Return -ENOMEM if kzalloc() fails (bsc#1195823).\n- scsi: qla2xxx: Suppress a kernel complaint in qla_create_qpair() (bsc#1195823).\n- scsi: qla2xxx: Update version to 10.02.07.200-k (bsc#1195823).\n- scsi: qla2xxx: Update version to 10.02.07.300-k (bsc#1195823).\n- scsi: qla2xxx: edif: Fix clang warning (bsc#1195823).\n- scsi: qla2xxx: edif: Fix inconsistent check of db_flags (bsc#1195823).\n- scsi: qla2xxx: edif: Reduce connection thrash (bsc#1195823).\n- scsi: qla2xxx: edif: Replace list_for_each_safe with list_for_each_entry_safe (bsc#1195823).\n- scsi: qla2xxx: edif: Tweak trace message (bsc#1195823).\n- scsi: scsi_debug: Sanity check block descriptor length in resp_mode_select() (git-fixes).\n- scsi: ufs: Fix race conditions related to driver data (git-fixes).\n- scsi: zfcp: Fix failed recovery on gone remote port with non-NPIV FCP devices (bsc#1195377 LTC#196245).\n- sunrpc/auth_gss: support timeout on gss upcalls (bsc#1193857).\n- tracing: Dump stacktrace trigger to the corresponding instance (git-fixes).\n- tracing: Have traceon and traceoff trigger honor the instance (git-fixes).\n- usb: common: ulpi: Fix crash in ulpi_match() (git-fixes).\n- usb: typec: tcpm: Do not disconnect while receiving VBUS off (git-fixes).\n- xfrm: fix MTU regression (bsc#1185377, bsc#1194048).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-765,SUSE-SLE-SERVER-12-SP5-2022-765", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0765-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:0765-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220765-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:0765-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010400.html" }, { "category": "self", "summary": "SUSE Bug 1046306", "url": "https://bugzilla.suse.com/1046306" }, { "category": "self", "summary": "SUSE Bug 1050244", "url": "https://bugzilla.suse.com/1050244" }, { "category": "self", "summary": "SUSE Bug 1089644", "url": "https://bugzilla.suse.com/1089644" }, { "category": "self", "summary": "SUSE Bug 1094978", "url": "https://bugzilla.suse.com/1094978" }, { "category": "self", "summary": "SUSE Bug 1097583", "url": "https://bugzilla.suse.com/1097583" }, { "category": "self", "summary": "SUSE Bug 1097584", "url": "https://bugzilla.suse.com/1097584" }, { "category": "self", "summary": "SUSE Bug 1097585", "url": "https://bugzilla.suse.com/1097585" }, { "category": "self", "summary": "SUSE Bug 1097586", "url": "https://bugzilla.suse.com/1097586" }, { "category": "self", "summary": "SUSE Bug 1097587", "url": "https://bugzilla.suse.com/1097587" }, { "category": "self", "summary": "SUSE Bug 1097588", "url": "https://bugzilla.suse.com/1097588" }, { "category": "self", "summary": "SUSE Bug 1101674", "url": "https://bugzilla.suse.com/1101674" }, { "category": "self", "summary": "SUSE Bug 1101816", "url": "https://bugzilla.suse.com/1101816" }, { "category": "self", "summary": "SUSE Bug 1103991", "url": "https://bugzilla.suse.com/1103991" }, { "category": "self", "summary": "SUSE Bug 1109837", "url": "https://bugzilla.suse.com/1109837" }, { "category": "self", "summary": "SUSE Bug 1111981", "url": "https://bugzilla.suse.com/1111981" }, { "category": "self", "summary": "SUSE Bug 1112374", "url": "https://bugzilla.suse.com/1112374" }, { "category": "self", "summary": "SUSE Bug 1114648", "url": "https://bugzilla.suse.com/1114648" }, { "category": "self", "summary": "SUSE Bug 1114685", "url": "https://bugzilla.suse.com/1114685" }, { "category": "self", "summary": "SUSE Bug 1114893", "url": "https://bugzilla.suse.com/1114893" }, { "category": "self", "summary": "SUSE Bug 1117495", "url": "https://bugzilla.suse.com/1117495" }, { "category": "self", "summary": "SUSE Bug 1118661", "url": "https://bugzilla.suse.com/1118661" }, { "category": "self", "summary": "SUSE Bug 1119113", "url": "https://bugzilla.suse.com/1119113" }, { "category": "self", "summary": "SUSE Bug 1136460", "url": "https://bugzilla.suse.com/1136460" }, { "category": "self", "summary": "SUSE Bug 1136461", "url": "https://bugzilla.suse.com/1136461" }, { "category": "self", "summary": "SUSE Bug 1157038", "url": "https://bugzilla.suse.com/1157038" }, { "category": "self", "summary": "SUSE Bug 1157923", "url": "https://bugzilla.suse.com/1157923" }, { "category": "self", "summary": "SUSE Bug 1158533", "url": "https://bugzilla.suse.com/1158533" }, { "category": "self", "summary": "SUSE Bug 1174852", "url": "https://bugzilla.suse.com/1174852" }, { "category": "self", "summary": "SUSE Bug 1185377", "url": "https://bugzilla.suse.com/1185377" }, { "category": "self", "summary": "SUSE Bug 1185973", "url": "https://bugzilla.suse.com/1185973" }, { "category": "self", "summary": "SUSE Bug 1187716", "url": "https://bugzilla.suse.com/1187716" }, { "category": "self", "summary": "SUSE Bug 1189126", "url": "https://bugzilla.suse.com/1189126" }, { "category": "self", "summary": "SUSE Bug 1191271", "url": "https://bugzilla.suse.com/1191271" }, { "category": "self", "summary": "SUSE Bug 1191580", "url": "https://bugzilla.suse.com/1191580" }, { "category": "self", "summary": "SUSE Bug 1191655", "url": "https://bugzilla.suse.com/1191655" }, { "category": "self", "summary": "SUSE Bug 1193857", "url": "https://bugzilla.suse.com/1193857" }, { "category": "self", "summary": "SUSE Bug 1193867", "url": "https://bugzilla.suse.com/1193867" }, { "category": "self", "summary": "SUSE Bug 1194048", "url": "https://bugzilla.suse.com/1194048" }, { "category": "self", "summary": "SUSE Bug 1194516", "url": "https://bugzilla.suse.com/1194516" }, { "category": "self", "summary": "SUSE Bug 1195080", "url": "https://bugzilla.suse.com/1195080" }, { "category": "self", "summary": "SUSE Bug 1195377", "url": "https://bugzilla.suse.com/1195377" }, { "category": "self", "summary": "SUSE Bug 1195536", "url": "https://bugzilla.suse.com/1195536" }, { "category": "self", "summary": "SUSE Bug 1195543", "url": "https://bugzilla.suse.com/1195543" }, { "category": "self", "summary": "SUSE Bug 1195612", "url": "https://bugzilla.suse.com/1195612" }, { "category": "self", "summary": "SUSE Bug 1195638", "url": "https://bugzilla.suse.com/1195638" }, { "category": "self", "summary": "SUSE Bug 1195795", "url": "https://bugzilla.suse.com/1195795" }, { "category": "self", "summary": "SUSE Bug 1195823", "url": "https://bugzilla.suse.com/1195823" }, { "category": "self", "summary": "SUSE Bug 1195840", "url": "https://bugzilla.suse.com/1195840" }, { "category": "self", "summary": "SUSE Bug 1195897", "url": "https://bugzilla.suse.com/1195897" }, { "category": "self", "summary": "SUSE Bug 1195908", "url": "https://bugzilla.suse.com/1195908" }, { "category": "self", "summary": "SUSE Bug 1195934", "url": "https://bugzilla.suse.com/1195934" }, { "category": "self", "summary": "SUSE Bug 1195949", "url": "https://bugzilla.suse.com/1195949" }, { "category": "self", "summary": "SUSE Bug 1195987", "url": "https://bugzilla.suse.com/1195987" }, { "category": "self", "summary": "SUSE Bug 1195995", "url": "https://bugzilla.suse.com/1195995" }, { "category": "self", "summary": "SUSE Bug 1196079", "url": "https://bugzilla.suse.com/1196079" }, { "category": "self", "summary": "SUSE Bug 1196155", "url": "https://bugzilla.suse.com/1196155" }, { "category": "self", "summary": "SUSE Bug 1196400", "url": "https://bugzilla.suse.com/1196400" }, { "category": "self", "summary": "SUSE Bug 1196516", "url": "https://bugzilla.suse.com/1196516" }, { "category": "self", "summary": "SUSE Bug 1196584", "url": "https://bugzilla.suse.com/1196584" }, { "category": "self", "summary": "SUSE Bug 1196612", "url": "https://bugzilla.suse.com/1196612" }, { "category": "self", "summary": "SUSE CVE CVE-2021-44879 page", "url": "https://www.suse.com/security/cve/CVE-2021-44879/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-45095 page", "url": "https://www.suse.com/security/cve/CVE-2021-45095/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0001 page", "url": "https://www.suse.com/security/cve/CVE-2022-0001/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0002 page", "url": "https://www.suse.com/security/cve/CVE-2022-0002/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0487 page", "url": "https://www.suse.com/security/cve/CVE-2022-0487/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0492 page", "url": "https://www.suse.com/security/cve/CVE-2022-0492/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0617 page", "url": "https://www.suse.com/security/cve/CVE-2022-0617/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0644 page", "url": "https://www.suse.com/security/cve/CVE-2022-0644/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0847 page", "url": "https://www.suse.com/security/cve/CVE-2022-0847/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-24448 page", "url": "https://www.suse.com/security/cve/CVE-2022-24448/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-24959 page", "url": "https://www.suse.com/security/cve/CVE-2022-24959/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2022-04-07T08:11:35Z", "generator": { "date": "2022-04-07T08:11:35Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:0765-1", "initial_release_date": "2022-04-07T08:11:35Z", "revision_history": [ { "date": "2022-04-07T08:11:35Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-azure-4.12.14-16.91.1.noarch", "product": { "name": "kernel-devel-azure-4.12.14-16.91.1.noarch", "product_id": "kernel-devel-azure-4.12.14-16.91.1.noarch" } }, { "category": "product_version", "name": "kernel-source-azure-4.12.14-16.91.1.noarch", "product": { "name": "kernel-source-azure-4.12.14-16.91.1.noarch", "product_id": "kernel-source-azure-4.12.14-16.91.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-azure-4.12.14-16.91.1.x86_64", "product": { "name": "cluster-md-kmp-azure-4.12.14-16.91.1.x86_64", "product_id": "cluster-md-kmp-azure-4.12.14-16.91.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-azure-4.12.14-16.91.1.x86_64", "product": { "name": "dlm-kmp-azure-4.12.14-16.91.1.x86_64", "product_id": "dlm-kmp-azure-4.12.14-16.91.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-azure-4.12.14-16.91.1.x86_64", "product": { "name": "gfs2-kmp-azure-4.12.14-16.91.1.x86_64", "product_id": "gfs2-kmp-azure-4.12.14-16.91.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-4.12.14-16.91.1.x86_64", "product": { "name": "kernel-azure-4.12.14-16.91.1.x86_64", "product_id": "kernel-azure-4.12.14-16.91.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-base-4.12.14-16.91.1.x86_64", "product": { "name": "kernel-azure-base-4.12.14-16.91.1.x86_64", "product_id": "kernel-azure-base-4.12.14-16.91.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-devel-4.12.14-16.91.1.x86_64", "product": { "name": "kernel-azure-devel-4.12.14-16.91.1.x86_64", "product_id": "kernel-azure-devel-4.12.14-16.91.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-extra-4.12.14-16.91.1.x86_64", "product": { "name": "kernel-azure-extra-4.12.14-16.91.1.x86_64", "product_id": "kernel-azure-extra-4.12.14-16.91.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-kgraft-devel-4.12.14-16.91.1.x86_64", "product": { "name": "kernel-azure-kgraft-devel-4.12.14-16.91.1.x86_64", "product_id": "kernel-azure-kgraft-devel-4.12.14-16.91.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-azure-4.12.14-16.91.1.x86_64", "product": { "name": "kernel-syms-azure-4.12.14-16.91.1.x86_64", "product_id": "kernel-syms-azure-4.12.14-16.91.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-azure-4.12.14-16.91.1.x86_64", "product": { "name": "kselftests-kmp-azure-4.12.14-16.91.1.x86_64", "product_id": "kselftests-kmp-azure-4.12.14-16.91.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-azure-4.12.14-16.91.1.x86_64", "product": { "name": "ocfs2-kmp-azure-4.12.14-16.91.1.x86_64", "product_id": "ocfs2-kmp-azure-4.12.14-16.91.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP5", "product": { "name": "SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-4.12.14-16.91.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.91.1.x86_64" }, "product_reference": "kernel-azure-4.12.14-16.91.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-base-4.12.14-16.91.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.91.1.x86_64" }, "product_reference": "kernel-azure-base-4.12.14-16.91.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-4.12.14-16.91.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.91.1.x86_64" }, "product_reference": "kernel-azure-devel-4.12.14-16.91.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-4.12.14-16.91.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.91.1.noarch" }, "product_reference": "kernel-devel-azure-4.12.14-16.91.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-4.12.14-16.91.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.91.1.noarch" }, "product_reference": "kernel-source-azure-4.12.14-16.91.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-4.12.14-16.91.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.91.1.x86_64" }, "product_reference": "kernel-syms-azure-4.12.14-16.91.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-4.12.14-16.91.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.91.1.x86_64" }, "product_reference": "kernel-azure-4.12.14-16.91.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-base-4.12.14-16.91.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.91.1.x86_64" }, "product_reference": "kernel-azure-base-4.12.14-16.91.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-4.12.14-16.91.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.91.1.x86_64" }, "product_reference": "kernel-azure-devel-4.12.14-16.91.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-4.12.14-16.91.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.91.1.noarch" }, "product_reference": "kernel-devel-azure-4.12.14-16.91.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-4.12.14-16.91.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.91.1.noarch" }, "product_reference": "kernel-source-azure-4.12.14-16.91.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-4.12.14-16.91.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.91.1.x86_64" }, "product_reference": "kernel-syms-azure-4.12.14-16.91.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-44879", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-44879" } ], "notes": [ { "category": "general", "text": "In gc_data_segment in fs/f2fs/gc.c in the Linux kernel before 5.16.3, special files are not considered, leading to a move_data_page NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.91.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-44879", "url": "https://www.suse.com/security/cve/CVE-2021-44879" }, { "category": "external", "summary": "SUSE Bug 1195987 for CVE-2021-44879", "url": "https://bugzilla.suse.com/1195987" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.91.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.91.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-07T08:11:35Z", "details": "moderate" } ], "title": "CVE-2021-44879" }, { "cve": "CVE-2021-45095", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-45095" } ], "notes": [ { "category": "general", "text": "pep_sock_accept in net/phonet/pep.c in the Linux kernel through 5.15.8 has a refcount leak.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.91.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-45095", "url": "https://www.suse.com/security/cve/CVE-2021-45095" }, { "category": "external", "summary": "SUSE Bug 1193867 for CVE-2021-45095", "url": "https://bugzilla.suse.com/1193867" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.91.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.91.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-07T08:11:35Z", "details": "moderate" } ], "title": "CVE-2021-45095" }, { "cve": "CVE-2022-0001", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0001" } ], "notes": [ { "category": "general", "text": "Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.91.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0001", "url": "https://www.suse.com/security/cve/CVE-2022-0001" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2022-0001", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2022-0001", "url": "https://bugzilla.suse.com/1196901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.91.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.91.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-07T08:11:35Z", "details": "moderate" } ], "title": "CVE-2022-0001" }, { "cve": "CVE-2022-0002", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0002" } ], "notes": [ { "category": "general", "text": "Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.91.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0002", "url": "https://www.suse.com/security/cve/CVE-2022-0002" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2022-0002", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2022-0002", "url": "https://bugzilla.suse.com/1196901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.91.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.91.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-07T08:11:35Z", "details": "moderate" } ], "title": "CVE-2022-0002" }, { "cve": "CVE-2022-0487", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0487" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove in drivers/memstick/host/rtsx_usb_ms.c in memstick in the Linux kernel. In this flaw, a local attacker with a user privilege may impact system Confidentiality. This flaw affects kernel versions prior to 5.14 rc1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.91.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0487", "url": "https://www.suse.com/security/cve/CVE-2022-0487" }, { "category": "external", "summary": "SUSE Bug 1194516 for CVE-2022-0487", "url": "https://bugzilla.suse.com/1194516" }, { "category": "external", "summary": "SUSE Bug 1195949 for CVE-2022-0487", "url": "https://bugzilla.suse.com/1195949" }, { "category": "external", "summary": "SUSE Bug 1198615 for CVE-2022-0487", "url": "https://bugzilla.suse.com/1198615" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.91.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.91.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-07T08:11:35Z", "details": "moderate" } ], "title": "CVE-2022-0487" }, { "cve": "CVE-2022-0492", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0492" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in the Linux kernel\u0027s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.91.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0492", "url": "https://www.suse.com/security/cve/CVE-2022-0492" }, { "category": "external", "summary": "SUSE Bug 1195543 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1195543" }, { "category": "external", "summary": "SUSE Bug 1195908 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1195908" }, { "category": "external", "summary": "SUSE Bug 1196612 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1196612" }, { "category": "external", "summary": "SUSE Bug 1196776 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1196776" }, { "category": "external", "summary": "SUSE Bug 1198615 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1198615" }, { "category": "external", "summary": "SUSE Bug 1199255 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1199255" }, { "category": "external", "summary": "SUSE Bug 1199615 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1199615" }, { "category": "external", "summary": "SUSE Bug 1200084 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1200084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.91.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.91.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-07T08:11:35Z", "details": "moderate" } ], "title": "CVE-2022-0492" }, { "cve": "CVE-2022-0617", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0617" } ], "notes": [ { "category": "general", "text": "A flaw null pointer dereference in the Linux kernel UDF file system functionality was found in the way user triggers udf_file_write_iter function for the malicious UDF image. A local user could use this flaw to crash the system. Actual from Linux kernel 4.2-rc1 till 5.17-rc2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.91.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0617", "url": "https://www.suse.com/security/cve/CVE-2022-0617" }, { "category": "external", "summary": "SUSE Bug 1196079 for CVE-2022-0617", "url": "https://bugzilla.suse.com/1196079" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.91.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.91.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-07T08:11:35Z", "details": "moderate" } ], "title": "CVE-2022-0617" }, { "cve": "CVE-2022-0644", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0644" } ], "notes": [ { "category": "general", "text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.91.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0644", "url": "https://www.suse.com/security/cve/CVE-2022-0644" }, { "category": "external", "summary": "SUSE Bug 1196155 for CVE-2022-0644", "url": "https://bugzilla.suse.com/1196155" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.91.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.91.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-07T08:11:35Z", "details": "moderate" } ], "title": "CVE-2022-0644" }, { "cve": "CVE-2022-0847", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0847" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way the \"flags\" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.91.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0847", "url": "https://www.suse.com/security/cve/CVE-2022-0847" }, { "category": "external", "summary": "SUSE Bug 1196584 for CVE-2022-0847", "url": "https://bugzilla.suse.com/1196584" }, { "category": "external", "summary": "SUSE Bug 1196601 for CVE-2022-0847", "url": "https://bugzilla.suse.com/1196601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.91.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.91.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-07T08:11:35Z", "details": "important" } ], "title": "CVE-2022-0847" }, { "cve": "CVE-2022-24448", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-24448" } ], "notes": [ { "category": "general", "text": "An issue was discovered in fs/nfs/dir.c in the Linux kernel before 5.16.5. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should occur, but the server instead returns uninitialized data in the file descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.91.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-24448", "url": "https://www.suse.com/security/cve/CVE-2022-24448" }, { "category": "external", "summary": "SUSE Bug 1195612 for CVE-2022-24448", "url": "https://bugzilla.suse.com/1195612" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.91.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.91.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-07T08:11:35Z", "details": "moderate" } ], "title": "CVE-2022-24448" }, { "cve": "CVE-2022-24959", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-24959" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.16.5. There is a memory leak in yam_siocdevprivate in drivers/net/hamradio/yam.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.91.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-24959", "url": "https://www.suse.com/security/cve/CVE-2022-24959" }, { "category": "external", "summary": "SUSE Bug 1195897 for CVE-2022-24959", "url": "https://bugzilla.suse.com/1195897" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.91.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.91.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.91.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.91.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-07T08:11:35Z", "details": "moderate" } ], "title": "CVE-2022-24959" } ] }
suse-su-2022:0762-1
Vulnerability from csaf_suse
Published
2022-03-08 18:07
Modified
2022-03-08 18:07
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.
Transient execution side-channel attacks attacking the Branch History Buffer (BHB),
named 'Branch Target Injection' and 'Intra-Mode Branch History Injection' are now mitigated.
The following security bugs were fixed:
- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).
- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).
- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)
- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
- CVE-2022-24448: Fixed an issue in fs/nfs/dir.c. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).
- CVE-2021-0920: Fixed a local privilege escalation due to a use-after-free bug in unix_gc (bsc#1193731).
- CVE-2016-10905: Fixed a use-after-free is gfs2_clear_rgrpd() and read_rindex_entry() (bsc#1146312).
Patchnames
HPE-Helion-OpenStack-8-2022-762,SUSE-2022-762,SUSE-OpenStack-Cloud-8-2022-762,SUSE-OpenStack-Cloud-Crowbar-8-2022-762,SUSE-SLE-HA-12-SP3-2022-762,SUSE-SLE-SAP-12-SP3-2022-762,SUSE-SLE-SERVER-12-SP3-2022-762,SUSE-SLE-SERVER-12-SP3-BCL-2022-762
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.\n\n\nTransient execution side-channel attacks attacking the Branch History Buffer (BHB),\nnamed \u0027Branch Target Injection\u0027 and \u0027Intra-Mode Branch History Injection\u0027 are now mitigated.\n\nThe following security bugs were fixed:\n\n- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).\n- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).\n- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)\n- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).\n- CVE-2022-24448: Fixed an issue in fs/nfs/dir.c. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).\n- CVE-2021-0920: Fixed a local privilege escalation due to a use-after-free bug in unix_gc (bsc#1193731).\n- CVE-2016-10905: Fixed a use-after-free is gfs2_clear_rgrpd() and read_rindex_entry() (bsc#1146312).\n", "title": "Description of the patch" }, { "category": "details", "text": "HPE-Helion-OpenStack-8-2022-762,SUSE-2022-762,SUSE-OpenStack-Cloud-8-2022-762,SUSE-OpenStack-Cloud-Crowbar-8-2022-762,SUSE-SLE-HA-12-SP3-2022-762,SUSE-SLE-SAP-12-SP3-2022-762,SUSE-SLE-SERVER-12-SP3-2022-762,SUSE-SLE-SERVER-12-SP3-BCL-2022-762", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0762-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:0762-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220762-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:0762-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010390.html" }, { "category": "self", "summary": "SUSE Bug 1146312", "url": "https://bugzilla.suse.com/1146312" }, { "category": "self", "summary": "SUSE Bug 1185973", "url": "https://bugzilla.suse.com/1185973" }, { "category": "self", "summary": "SUSE Bug 1191580", "url": "https://bugzilla.suse.com/1191580" }, { "category": "self", "summary": "SUSE Bug 1193731", "url": "https://bugzilla.suse.com/1193731" }, { "category": "self", "summary": "SUSE Bug 1194463", "url": "https://bugzilla.suse.com/1194463" }, { "category": "self", "summary": "SUSE Bug 1195536", "url": "https://bugzilla.suse.com/1195536" }, { "category": "self", "summary": "SUSE Bug 1195543", "url": "https://bugzilla.suse.com/1195543" }, { "category": "self", "summary": "SUSE Bug 1195612", "url": "https://bugzilla.suse.com/1195612" }, { "category": "self", "summary": "SUSE Bug 1195908", "url": "https://bugzilla.suse.com/1195908" }, { "category": "self", "summary": "SUSE Bug 1195939", "url": "https://bugzilla.suse.com/1195939" }, { "category": "self", "summary": "SUSE Bug 1196079", "url": "https://bugzilla.suse.com/1196079" }, { "category": "self", "summary": "SUSE Bug 1196612", "url": "https://bugzilla.suse.com/1196612" }, { "category": "self", "summary": "SUSE CVE CVE-2016-10905 page", "url": "https://www.suse.com/security/cve/CVE-2016-10905/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-0920 page", "url": "https://www.suse.com/security/cve/CVE-2021-0920/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0001 page", "url": "https://www.suse.com/security/cve/CVE-2022-0001/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0002 page", "url": "https://www.suse.com/security/cve/CVE-2022-0002/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0492 page", "url": "https://www.suse.com/security/cve/CVE-2022-0492/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0617 page", "url": "https://www.suse.com/security/cve/CVE-2022-0617/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-24448 page", "url": "https://www.suse.com/security/cve/CVE-2022-24448/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2022-03-08T18:07:43Z", "generator": { "date": "2022-03-08T18:07:43Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:0762-1", "initial_release_date": "2022-03-08T18:07:43Z", "revision_history": [ { "date": "2022-03-08T18:07:43Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.4.180-94.156.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.4.180-94.156.1.aarch64", "product_id": "cluster-md-kmp-default-4.4.180-94.156.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.180-94.156.1.aarch64", "product": { "name": "dlm-kmp-default-4.4.180-94.156.1.aarch64", "product_id": "dlm-kmp-default-4.4.180-94.156.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.180-94.156.1.aarch64", "product": { "name": "gfs2-kmp-default-4.4.180-94.156.1.aarch64", "product_id": "gfs2-kmp-default-4.4.180-94.156.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.4.180-94.156.1.aarch64", "product": { "name": "kernel-default-4.4.180-94.156.1.aarch64", "product_id": "kernel-default-4.4.180-94.156.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.180-94.156.1.aarch64", "product": { "name": "kernel-default-base-4.4.180-94.156.1.aarch64", "product_id": "kernel-default-base-4.4.180-94.156.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.180-94.156.1.aarch64", "product": { "name": "kernel-default-devel-4.4.180-94.156.1.aarch64", "product_id": "kernel-default-devel-4.4.180-94.156.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.180-94.156.1.aarch64", "product": { "name": "kernel-default-extra-4.4.180-94.156.1.aarch64", "product_id": "kernel-default-extra-4.4.180-94.156.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.180-94.156.1.aarch64", "product": { "name": "kernel-default-kgraft-4.4.180-94.156.1.aarch64", "product_id": "kernel-default-kgraft-4.4.180-94.156.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.180-94.156.1.aarch64", "product": { "name": "kernel-obs-build-4.4.180-94.156.1.aarch64", "product_id": "kernel-obs-build-4.4.180-94.156.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.180-94.156.1.aarch64", "product": { "name": "kernel-obs-qa-4.4.180-94.156.1.aarch64", "product_id": "kernel-obs-qa-4.4.180-94.156.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.4.180-94.156.1.aarch64", "product": { "name": "kernel-syms-4.4.180-94.156.1.aarch64", "product_id": "kernel-syms-4.4.180-94.156.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.180-94.156.1.aarch64", "product": { "name": "kernel-vanilla-4.4.180-94.156.1.aarch64", "product_id": "kernel-vanilla-4.4.180-94.156.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.180-94.156.1.aarch64", "product": { "name": "kernel-vanilla-base-4.4.180-94.156.1.aarch64", "product_id": "kernel-vanilla-base-4.4.180-94.156.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.180-94.156.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.4.180-94.156.1.aarch64", "product_id": "kernel-vanilla-devel-4.4.180-94.156.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.4.180-94.156.1.aarch64", "product": { "name": "kselftests-kmp-default-4.4.180-94.156.1.aarch64", "product_id": "kselftests-kmp-default-4.4.180-94.156.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.180-94.156.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.4.180-94.156.1.aarch64", "product_id": "ocfs2-kmp-default-4.4.180-94.156.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.4.180-94.156.1.noarch", "product": { "name": "kernel-devel-4.4.180-94.156.1.noarch", "product_id": "kernel-devel-4.4.180-94.156.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.4.180-94.156.1.noarch", "product": { "name": "kernel-macros-4.4.180-94.156.1.noarch", "product_id": "kernel-macros-4.4.180-94.156.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.4.180-94.156.1.noarch", "product": { "name": "kernel-source-4.4.180-94.156.1.noarch", "product_id": "kernel-source-4.4.180-94.156.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.4.180-94.156.1.noarch", "product": { "name": "kernel-docs-4.4.180-94.156.1.noarch", "product_id": "kernel-docs-4.4.180-94.156.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.4.180-94.156.1.noarch", "product": { "name": "kernel-docs-html-4.4.180-94.156.1.noarch", "product_id": "kernel-docs-html-4.4.180-94.156.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-pdf-4.4.180-94.156.1.noarch", "product": { "name": "kernel-docs-pdf-4.4.180-94.156.1.noarch", "product_id": "kernel-docs-pdf-4.4.180-94.156.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.4.180-94.156.1.noarch", "product": { "name": "kernel-source-vanilla-4.4.180-94.156.1.noarch", "product_id": "kernel-source-vanilla-4.4.180-94.156.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-debug-4.4.180-94.156.1.ppc64le", "product": { "name": "cluster-md-kmp-debug-4.4.180-94.156.1.ppc64le", "product_id": "cluster-md-kmp-debug-4.4.180-94.156.1.ppc64le" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.4.180-94.156.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.4.180-94.156.1.ppc64le", "product_id": "cluster-md-kmp-default-4.4.180-94.156.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-debug-4.4.180-94.156.1.ppc64le", "product": { "name": "dlm-kmp-debug-4.4.180-94.156.1.ppc64le", "product_id": "dlm-kmp-debug-4.4.180-94.156.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.180-94.156.1.ppc64le", "product": { "name": "dlm-kmp-default-4.4.180-94.156.1.ppc64le", "product_id": "dlm-kmp-default-4.4.180-94.156.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-debug-4.4.180-94.156.1.ppc64le", "product": { "name": "gfs2-kmp-debug-4.4.180-94.156.1.ppc64le", "product_id": "gfs2-kmp-debug-4.4.180-94.156.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.180-94.156.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.4.180-94.156.1.ppc64le", "product_id": "gfs2-kmp-default-4.4.180-94.156.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.4.180-94.156.1.ppc64le", "product": { "name": "kernel-debug-4.4.180-94.156.1.ppc64le", "product_id": "kernel-debug-4.4.180-94.156.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.4.180-94.156.1.ppc64le", "product": { "name": "kernel-debug-base-4.4.180-94.156.1.ppc64le", "product_id": "kernel-debug-base-4.4.180-94.156.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.4.180-94.156.1.ppc64le", "product": { "name": "kernel-debug-devel-4.4.180-94.156.1.ppc64le", "product_id": "kernel-debug-devel-4.4.180-94.156.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-extra-4.4.180-94.156.1.ppc64le", "product": { "name": "kernel-debug-extra-4.4.180-94.156.1.ppc64le", "product_id": "kernel-debug-extra-4.4.180-94.156.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-kgraft-4.4.180-94.156.1.ppc64le", "product": { "name": "kernel-debug-kgraft-4.4.180-94.156.1.ppc64le", "product_id": "kernel-debug-kgraft-4.4.180-94.156.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.4.180-94.156.1.ppc64le", "product": { "name": "kernel-default-4.4.180-94.156.1.ppc64le", "product_id": "kernel-default-4.4.180-94.156.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.4.180-94.156.1.ppc64le", "product": { "name": "kernel-default-base-4.4.180-94.156.1.ppc64le", "product_id": "kernel-default-base-4.4.180-94.156.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.180-94.156.1.ppc64le", "product": { "name": "kernel-default-devel-4.4.180-94.156.1.ppc64le", "product_id": "kernel-default-devel-4.4.180-94.156.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.180-94.156.1.ppc64le", "product": { "name": "kernel-default-extra-4.4.180-94.156.1.ppc64le", "product_id": "kernel-default-extra-4.4.180-94.156.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "product": { "name": "kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "product_id": "kernel-default-kgraft-4.4.180-94.156.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.180-94.156.1.ppc64le", "product": { "name": "kernel-obs-build-4.4.180-94.156.1.ppc64le", "product_id": "kernel-obs-build-4.4.180-94.156.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.180-94.156.1.ppc64le", "product": { "name": "kernel-obs-qa-4.4.180-94.156.1.ppc64le", "product_id": "kernel-obs-qa-4.4.180-94.156.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.4.180-94.156.1.ppc64le", "product": { "name": "kernel-syms-4.4.180-94.156.1.ppc64le", "product_id": "kernel-syms-4.4.180-94.156.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.180-94.156.1.ppc64le", "product": { "name": "kernel-vanilla-4.4.180-94.156.1.ppc64le", "product_id": "kernel-vanilla-4.4.180-94.156.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.180-94.156.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.4.180-94.156.1.ppc64le", "product_id": "kernel-vanilla-base-4.4.180-94.156.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.180-94.156.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.4.180-94.156.1.ppc64le", "product_id": "kernel-vanilla-devel-4.4.180-94.156.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "product": { "name": "kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "product_id": "kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-debug-4.4.180-94.156.1.ppc64le", "product": { "name": "kselftests-kmp-debug-4.4.180-94.156.1.ppc64le", "product_id": "kselftests-kmp-debug-4.4.180-94.156.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.4.180-94.156.1.ppc64le", "product": { "name": "kselftests-kmp-default-4.4.180-94.156.1.ppc64le", "product_id": "kselftests-kmp-default-4.4.180-94.156.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-debug-4.4.180-94.156.1.ppc64le", "product": { "name": "ocfs2-kmp-debug-4.4.180-94.156.1.ppc64le", "product_id": "ocfs2-kmp-debug-4.4.180-94.156.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.180-94.156.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.4.180-94.156.1.ppc64le", "product_id": "ocfs2-kmp-default-4.4.180-94.156.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.4.180-94.156.1.s390x", "product": { "name": "cluster-md-kmp-default-4.4.180-94.156.1.s390x", "product_id": "cluster-md-kmp-default-4.4.180-94.156.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.180-94.156.1.s390x", "product": { "name": "dlm-kmp-default-4.4.180-94.156.1.s390x", "product_id": "dlm-kmp-default-4.4.180-94.156.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.180-94.156.1.s390x", "product": { "name": "gfs2-kmp-default-4.4.180-94.156.1.s390x", "product_id": "gfs2-kmp-default-4.4.180-94.156.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.4.180-94.156.1.s390x", "product": { "name": "kernel-default-4.4.180-94.156.1.s390x", "product_id": "kernel-default-4.4.180-94.156.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.4.180-94.156.1.s390x", "product": { "name": "kernel-default-base-4.4.180-94.156.1.s390x", "product_id": "kernel-default-base-4.4.180-94.156.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.180-94.156.1.s390x", "product": { "name": "kernel-default-devel-4.4.180-94.156.1.s390x", "product_id": "kernel-default-devel-4.4.180-94.156.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.180-94.156.1.s390x", "product": { "name": "kernel-default-extra-4.4.180-94.156.1.s390x", "product_id": "kernel-default-extra-4.4.180-94.156.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.180-94.156.1.s390x", "product": { "name": "kernel-default-kgraft-4.4.180-94.156.1.s390x", "product_id": "kernel-default-kgraft-4.4.180-94.156.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.4.180-94.156.1.s390x", "product": { "name": "kernel-default-man-4.4.180-94.156.1.s390x", "product_id": "kernel-default-man-4.4.180-94.156.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.180-94.156.1.s390x", "product": { "name": "kernel-obs-build-4.4.180-94.156.1.s390x", "product_id": "kernel-obs-build-4.4.180-94.156.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.180-94.156.1.s390x", "product": { "name": "kernel-obs-qa-4.4.180-94.156.1.s390x", "product_id": "kernel-obs-qa-4.4.180-94.156.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.4.180-94.156.1.s390x", "product": { "name": "kernel-syms-4.4.180-94.156.1.s390x", "product_id": "kernel-syms-4.4.180-94.156.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.180-94.156.1.s390x", "product": { "name": "kernel-vanilla-4.4.180-94.156.1.s390x", "product_id": "kernel-vanilla-4.4.180-94.156.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.180-94.156.1.s390x", "product": { "name": "kernel-vanilla-base-4.4.180-94.156.1.s390x", "product_id": "kernel-vanilla-base-4.4.180-94.156.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.180-94.156.1.s390x", "product": { "name": "kernel-vanilla-devel-4.4.180-94.156.1.s390x", "product_id": "kernel-vanilla-devel-4.4.180-94.156.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.4.180-94.156.1.s390x", "product": { "name": "kernel-zfcpdump-4.4.180-94.156.1.s390x", "product_id": "kernel-zfcpdump-4.4.180-94.156.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.4.180-94.156.1.s390x", "product": { "name": "kselftests-kmp-default-4.4.180-94.156.1.s390x", "product_id": "kselftests-kmp-default-4.4.180-94.156.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.180-94.156.1.s390x", "product": { "name": "ocfs2-kmp-default-4.4.180-94.156.1.s390x", "product_id": "ocfs2-kmp-default-4.4.180-94.156.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-4.4.180-94.156.1.x86_64", "product": { "name": "kernel-default-4.4.180-94.156.1.x86_64", "product_id": "kernel-default-4.4.180-94.156.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.180-94.156.1.x86_64", "product": { "name": "kernel-default-base-4.4.180-94.156.1.x86_64", "product_id": "kernel-default-base-4.4.180-94.156.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.180-94.156.1.x86_64", "product": { "name": "kernel-default-devel-4.4.180-94.156.1.x86_64", "product_id": "kernel-default-devel-4.4.180-94.156.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.180-94.156.1.x86_64", "product": { "name": "kernel-default-kgraft-4.4.180-94.156.1.x86_64", "product_id": "kernel-default-kgraft-4.4.180-94.156.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.4.180-94.156.1.x86_64", "product": { "name": "kernel-syms-4.4.180-94.156.1.x86_64", "product_id": "kernel-syms-4.4.180-94.156.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "product": { "name": "kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "product_id": "kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-debug-4.4.180-94.156.1.x86_64", "product": { "name": "cluster-md-kmp-debug-4.4.180-94.156.1.x86_64", "product_id": "cluster-md-kmp-debug-4.4.180-94.156.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.4.180-94.156.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.4.180-94.156.1.x86_64", "product_id": "cluster-md-kmp-default-4.4.180-94.156.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-debug-4.4.180-94.156.1.x86_64", "product": { "name": "dlm-kmp-debug-4.4.180-94.156.1.x86_64", "product_id": "dlm-kmp-debug-4.4.180-94.156.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.180-94.156.1.x86_64", "product": { "name": "dlm-kmp-default-4.4.180-94.156.1.x86_64", "product_id": "dlm-kmp-default-4.4.180-94.156.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-debug-4.4.180-94.156.1.x86_64", "product": { "name": "gfs2-kmp-debug-4.4.180-94.156.1.x86_64", "product_id": "gfs2-kmp-debug-4.4.180-94.156.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.180-94.156.1.x86_64", "product": { "name": "gfs2-kmp-default-4.4.180-94.156.1.x86_64", "product_id": "gfs2-kmp-default-4.4.180-94.156.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.4.180-94.156.1.x86_64", "product": { "name": "kernel-debug-4.4.180-94.156.1.x86_64", "product_id": "kernel-debug-4.4.180-94.156.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.4.180-94.156.1.x86_64", "product": { "name": "kernel-debug-base-4.4.180-94.156.1.x86_64", "product_id": "kernel-debug-base-4.4.180-94.156.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.4.180-94.156.1.x86_64", "product": { "name": "kernel-debug-devel-4.4.180-94.156.1.x86_64", "product_id": "kernel-debug-devel-4.4.180-94.156.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-extra-4.4.180-94.156.1.x86_64", "product": { "name": "kernel-debug-extra-4.4.180-94.156.1.x86_64", "product_id": "kernel-debug-extra-4.4.180-94.156.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-kgraft-4.4.180-94.156.1.x86_64", "product": { "name": "kernel-debug-kgraft-4.4.180-94.156.1.x86_64", "product_id": "kernel-debug-kgraft-4.4.180-94.156.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.180-94.156.1.x86_64", "product": { "name": "kernel-default-extra-4.4.180-94.156.1.x86_64", "product_id": "kernel-default-extra-4.4.180-94.156.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.180-94.156.1.x86_64", "product": { "name": "kernel-obs-build-4.4.180-94.156.1.x86_64", "product_id": "kernel-obs-build-4.4.180-94.156.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.180-94.156.1.x86_64", "product": { "name": "kernel-obs-qa-4.4.180-94.156.1.x86_64", "product_id": "kernel-obs-qa-4.4.180-94.156.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.180-94.156.1.x86_64", "product": { "name": "kernel-vanilla-4.4.180-94.156.1.x86_64", "product_id": "kernel-vanilla-4.4.180-94.156.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.180-94.156.1.x86_64", "product": { "name": "kernel-vanilla-base-4.4.180-94.156.1.x86_64", "product_id": "kernel-vanilla-base-4.4.180-94.156.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.180-94.156.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.4.180-94.156.1.x86_64", "product_id": "kernel-vanilla-devel-4.4.180-94.156.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-debug-4.4.180-94.156.1.x86_64", "product": { "name": "kselftests-kmp-debug-4.4.180-94.156.1.x86_64", "product_id": "kselftests-kmp-debug-4.4.180-94.156.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.4.180-94.156.1.x86_64", "product": { "name": "kselftests-kmp-default-4.4.180-94.156.1.x86_64", "product_id": "kselftests-kmp-default-4.4.180-94.156.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-debug-4.4.180-94.156.1.x86_64", "product": { "name": "ocfs2-kmp-debug-4.4.180-94.156.1.x86_64", "product_id": "ocfs2-kmp-debug-4.4.180-94.156.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.180-94.156.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.4.180-94.156.1.x86_64", "product_id": "ocfs2-kmp-default-4.4.180-94.156.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "HPE Helion OpenStack 8", "product": { "name": "HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8", "product_identification_helper": { "cpe": "cpe:/o:suse:hpe-helion-openstack:8" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud 8", "product": { "name": "SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:8" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud Crowbar 8", "product": { "name": "SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:8" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 12 SP3", "product": { "name": "SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.156.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-default-4.4.180-94.156.1.x86_64" }, "product_reference": "kernel-default-4.4.180-94.156.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.156.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.156.1.x86_64" }, "product_reference": "kernel-default-base-4.4.180-94.156.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.156.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.156.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.180-94.156.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.4.180-94.156.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64" }, "product_reference": "kernel-default-kgraft-4.4.180-94.156.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.180-94.156.1.noarch as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.156.1.noarch" }, "product_reference": "kernel-devel-4.4.180-94.156.1.noarch", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.180-94.156.1.noarch as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.156.1.noarch" }, "product_reference": "kernel-macros-4.4.180-94.156.1.noarch", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.180-94.156.1.noarch as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-source-4.4.180-94.156.1.noarch" }, "product_reference": "kernel-source-4.4.180-94.156.1.noarch", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.156.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.156.1.x86_64" }, "product_reference": "kernel-syms-4.4.180-94.156.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.156.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.156.1.x86_64" }, "product_reference": "kernel-default-4.4.180-94.156.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.156.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.156.1.x86_64" }, "product_reference": "kernel-default-base-4.4.180-94.156.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.156.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.156.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.180-94.156.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.4.180-94.156.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64" }, "product_reference": "kernel-default-kgraft-4.4.180-94.156.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.180-94.156.1.noarch as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.156.1.noarch" }, "product_reference": "kernel-devel-4.4.180-94.156.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.180-94.156.1.noarch as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.156.1.noarch" }, "product_reference": "kernel-macros-4.4.180-94.156.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.180-94.156.1.noarch as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.156.1.noarch" }, "product_reference": "kernel-source-4.4.180-94.156.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.156.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.156.1.x86_64" }, "product_reference": "kernel-syms-4.4.180-94.156.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.156.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.156.1.x86_64" }, "product_reference": "kernel-default-4.4.180-94.156.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.156.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.156.1.x86_64" }, "product_reference": "kernel-default-base-4.4.180-94.156.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.156.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.156.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.180-94.156.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.4.180-94.156.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64" }, "product_reference": "kernel-default-kgraft-4.4.180-94.156.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.180-94.156.1.noarch as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.156.1.noarch" }, "product_reference": "kernel-devel-4.4.180-94.156.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.180-94.156.1.noarch as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.156.1.noarch" }, "product_reference": "kernel-macros-4.4.180-94.156.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.180-94.156.1.noarch as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.156.1.noarch" }, "product_reference": "kernel-source-4.4.180-94.156.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.156.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.156.1.x86_64" }, "product_reference": "kernel-syms-4.4.180-94.156.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.180-94.156.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.4.180-94.156.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.180-94.156.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.4.180-94.156.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.180-94.156.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.4.180-94.156.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.180-94.156.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.4.180-94.156.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.180-94.156.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.s390x" }, "product_reference": "dlm-kmp-default-4.4.180-94.156.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.180-94.156.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.x86_64" }, "product_reference": "dlm-kmp-default-4.4.180-94.156.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.180-94.156.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.4.180-94.156.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.180-94.156.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.s390x" }, "product_reference": "gfs2-kmp-default-4.4.180-94.156.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.180-94.156.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.4.180-94.156.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.180-94.156.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.4.180-94.156.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.180-94.156.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.4.180-94.156.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.180-94.156.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.4.180-94.156.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.156.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.ppc64le" }, "product_reference": "kernel-default-4.4.180-94.156.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.156.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.x86_64" }, "product_reference": "kernel-default-4.4.180-94.156.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.156.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.ppc64le" }, "product_reference": "kernel-default-base-4.4.180-94.156.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.156.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.x86_64" }, "product_reference": "kernel-default-base-4.4.180-94.156.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.156.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.ppc64le" }, "product_reference": "kernel-default-devel-4.4.180-94.156.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.156.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.180-94.156.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.4.180-94.156.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.ppc64le" }, "product_reference": "kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.4.180-94.156.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.x86_64" }, "product_reference": "kernel-default-kgraft-4.4.180-94.156.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.180-94.156.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.156.1.noarch" }, "product_reference": "kernel-devel-4.4.180-94.156.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.180-94.156.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.156.1.noarch" }, "product_reference": "kernel-macros-4.4.180-94.156.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.180-94.156.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.156.1.noarch" }, "product_reference": "kernel-source-4.4.180-94.156.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.156.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.ppc64le" }, "product_reference": "kernel-syms-4.4.180-94.156.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.156.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.x86_64" }, "product_reference": "kernel-syms-4.4.180-94.156.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.156.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.aarch64" }, "product_reference": "kernel-default-4.4.180-94.156.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.156.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.ppc64le" }, "product_reference": "kernel-default-4.4.180-94.156.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.156.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.s390x" }, "product_reference": "kernel-default-4.4.180-94.156.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.156.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.x86_64" }, "product_reference": "kernel-default-4.4.180-94.156.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.156.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.aarch64" }, "product_reference": "kernel-default-base-4.4.180-94.156.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.156.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.ppc64le" }, "product_reference": "kernel-default-base-4.4.180-94.156.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.156.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.s390x" }, "product_reference": "kernel-default-base-4.4.180-94.156.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.156.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.x86_64" }, "product_reference": "kernel-default-base-4.4.180-94.156.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.156.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.aarch64" }, "product_reference": "kernel-default-devel-4.4.180-94.156.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.156.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.ppc64le" }, "product_reference": "kernel-default-devel-4.4.180-94.156.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.156.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.s390x" }, "product_reference": "kernel-default-devel-4.4.180-94.156.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.156.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.180-94.156.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.4.180-94.156.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.ppc64le" }, "product_reference": "kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.4.180-94.156.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.x86_64" }, "product_reference": "kernel-default-kgraft-4.4.180-94.156.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.4.180-94.156.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.156.1.s390x" }, "product_reference": "kernel-default-man-4.4.180-94.156.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.180-94.156.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.156.1.noarch" }, "product_reference": "kernel-devel-4.4.180-94.156.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.180-94.156.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.156.1.noarch" }, "product_reference": "kernel-macros-4.4.180-94.156.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.180-94.156.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.156.1.noarch" }, "product_reference": "kernel-source-4.4.180-94.156.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.156.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.aarch64" }, "product_reference": "kernel-syms-4.4.180-94.156.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.156.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.ppc64le" }, "product_reference": "kernel-syms-4.4.180-94.156.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.156.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.s390x" }, "product_reference": "kernel-syms-4.4.180-94.156.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.156.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.x86_64" }, "product_reference": "kernel-syms-4.4.180-94.156.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.156.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.156.1.x86_64" }, "product_reference": "kernel-default-4.4.180-94.156.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.156.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.156.1.x86_64" }, "product_reference": "kernel-default-base-4.4.180-94.156.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.156.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.156.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.180-94.156.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.180-94.156.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.156.1.noarch" }, "product_reference": "kernel-devel-4.4.180-94.156.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.180-94.156.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.156.1.noarch" }, "product_reference": "kernel-macros-4.4.180-94.156.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.180-94.156.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.156.1.noarch" }, "product_reference": "kernel-source-4.4.180-94.156.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.156.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.156.1.x86_64" }, "product_reference": "kernel-syms-4.4.180-94.156.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-10905", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-10905" } ], "notes": [ { "category": "general", "text": "An issue was discovered in fs/gfs2/rgrp.c in the Linux kernel before 4.8. A use-after-free is caused by the functions gfs2_clear_rgrpd and read_rindex_entry.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-10905", "url": "https://www.suse.com/security/cve/CVE-2016-10905" }, { "category": "external", "summary": "SUSE Bug 1146312 for CVE-2016-10905", "url": "https://bugzilla.suse.com/1146312" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:07:43Z", "details": "moderate" } ], "title": "CVE-2016-10905" }, { "cve": "CVE-2021-0920", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-0920" } ], "notes": [ { "category": "general", "text": "In unix_scm_to_skb of af_unix.c, there is a possible use after free bug due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-196926917References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-0920", "url": "https://www.suse.com/security/cve/CVE-2021-0920" }, { "category": "external", "summary": "SUSE Bug 1193731 for CVE-2021-0920", "url": "https://bugzilla.suse.com/1193731" }, { "category": "external", "summary": "SUSE Bug 1194463 for CVE-2021-0920", "url": "https://bugzilla.suse.com/1194463" }, { "category": "external", "summary": "SUSE Bug 1195939 for CVE-2021-0920", "url": "https://bugzilla.suse.com/1195939" }, { "category": "external", "summary": "SUSE Bug 1199255 for CVE-2021-0920", "url": "https://bugzilla.suse.com/1199255" }, { "category": "external", "summary": "SUSE Bug 1200084 for CVE-2021-0920", "url": "https://bugzilla.suse.com/1200084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:07:43Z", "details": "important" } ], "title": "CVE-2021-0920" }, { "cve": "CVE-2022-0001", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0001" } ], "notes": [ { "category": "general", "text": "Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0001", "url": "https://www.suse.com/security/cve/CVE-2022-0001" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2022-0001", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2022-0001", "url": "https://bugzilla.suse.com/1196901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:07:43Z", "details": "moderate" } ], "title": "CVE-2022-0001" }, { "cve": "CVE-2022-0002", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0002" } ], "notes": [ { "category": "general", "text": "Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0002", "url": "https://www.suse.com/security/cve/CVE-2022-0002" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2022-0002", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2022-0002", "url": "https://bugzilla.suse.com/1196901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:07:43Z", "details": "moderate" } ], "title": "CVE-2022-0002" }, { "cve": "CVE-2022-0492", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0492" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in the Linux kernel\u0027s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0492", "url": "https://www.suse.com/security/cve/CVE-2022-0492" }, { "category": "external", "summary": "SUSE Bug 1195543 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1195543" }, { "category": "external", "summary": "SUSE Bug 1195908 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1195908" }, { "category": "external", "summary": "SUSE Bug 1196612 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1196612" }, { "category": "external", "summary": "SUSE Bug 1196776 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1196776" }, { "category": "external", "summary": "SUSE Bug 1198615 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1198615" }, { "category": "external", "summary": "SUSE Bug 1199255 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1199255" }, { "category": "external", "summary": "SUSE Bug 1199615 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1199615" }, { "category": "external", "summary": "SUSE Bug 1200084 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1200084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:07:43Z", "details": "moderate" } ], "title": "CVE-2022-0492" }, { "cve": "CVE-2022-0617", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0617" } ], "notes": [ { "category": "general", "text": "A flaw null pointer dereference in the Linux kernel UDF file system functionality was found in the way user triggers udf_file_write_iter function for the malicious UDF image. A local user could use this flaw to crash the system. Actual from Linux kernel 4.2-rc1 till 5.17-rc2.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0617", "url": "https://www.suse.com/security/cve/CVE-2022-0617" }, { "category": "external", "summary": "SUSE Bug 1196079 for CVE-2022-0617", "url": "https://bugzilla.suse.com/1196079" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:07:43Z", "details": "moderate" } ], "title": "CVE-2022-0617" }, { "cve": "CVE-2022-24448", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-24448" } ], "notes": [ { "category": "general", "text": "An issue was discovered in fs/nfs/dir.c in the Linux kernel before 5.16.5. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should occur, but the server instead returns uninitialized data in the file descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-24448", "url": "https://www.suse.com/security/cve/CVE-2022-24448" }, { "category": "external", "summary": "SUSE Bug 1195612 for CVE-2022-24448", "url": "https://bugzilla.suse.com/1195612" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.156.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.156.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.156.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.156.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_156-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:07:43Z", "details": "moderate" } ], "title": "CVE-2022-24448" } ] }
suse-su-2022:0755-1
Vulnerability from csaf_suse
Published
2022-03-08 18:02
Modified
2022-03-08 18:02
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP3 Azure kernel was updated to receive various security and bugfixes.
Transient execution side-channel attacks attacking the Branch History Buffer (BHB),
named 'Branch Target Injection' and 'Intra-Mode Branch History Injection' are now mitigated.
The following security bugs were fixed:
- CVE-2022-0847: Fixed a vulnerability were a local attackers could overwrite data in arbitrary (read-only) files (bsc#1196584).
- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).
- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).
- CVE-2022-25375: The RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command. Attackers can obtain sensitive information from kernel memory (bsc#1196235).
- CVE-2022-0516: Fixed missing check in ioctl related to KVM in s390 allows kernel memory read/write (bsc#1195516).
- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
The following non-security bugs were fixed:
- ACPI/IORT: Check node revision for PMCG resources (git-fixes).
- ALSA: hda/realtek: Add missing fixup-model entry for Gigabyte X570 ALC1220 quirks (git-fixes).
- ALSA: hda/realtek: Add quirk for ASUS GU603 (git-fixes).
- ALSA: hda/realtek: Fix silent output on Gigabyte X570 Aorus Xtreme after reboot from Windows (git-fixes).
- ALSA: hda/realtek: Fix silent output on Gigabyte X570S Aorus Master (newer chipset) (git-fixes).
- ALSA: hda: Fix missing codec probe on Shenker Dock 15 (git-fixes).
- ALSA: hda: Fix regression on forced probe mask option (git-fixes).
- ALSA: usb-audio: Correct quirk for VF0770 (git-fixes).
- ALSA: usb-audio: initialize variables that could ignore errors (git-fixes).
- ASoC: Revert 'ASoC: mediatek: Check for error clk pointer' (git-fixes).
- ASoC: cpcap: Check for NULL pointer after calling of_get_child_by_name (git-fixes).
- ASoC: fsl: Add missing error handling in pcm030_fabric_probe (git-fixes).
- ASoC: max9759: fix underflow in speaker_gain_control_put() (git-fixes).
- ASoC: ops: Fix stereo change notifications in snd_soc_put_volsw() (git-fixes).
- ASoC: ops: Fix stereo change notifications in snd_soc_put_volsw_range() (git-fixes).
- ASoC: ops: Reject out of bounds values in snd_soc_put_volsw() (git-fixes).
- ASoC: ops: Reject out of bounds values in snd_soc_put_volsw_sx() (git-fixes).
- ASoC: ops: Reject out of bounds values in snd_soc_put_xr_sx() (git-fixes).
- ASoC: xilinx: xlnx_formatter_pcm: Make buffer bytes multiple of period bytes (git-fixes).
- Align s390 NVME target options with other architectures (bsc#1188404, jsc#SLE-22494).
- Bluetooth: refactor malicious adv data check (git-fixes).
- EDAC/xgene: Fix deferred probing (bsc#1178134).
- HID:Add support for UGTABLET WP5540 (git-fixes).
- IB/cm: Avoid a loop when device has 255 ports (git-fixes)
- IB/cma: Do not send IGMP leaves for sendonly Multicast groups (git-fixes).
- IB/hfi1: Fix AIP early init panic (jsc#SLE-13208).
- IB/hfi1: Fix error return code in parse_platform_config() (git-fixes)
- IB/hfi1: Use kzalloc() for mmu_rb_handler allocation (git-fixes)
- IB/isert: Fix a use after free in isert_connect_request (git-fixes)
- IB/mlx4: Separate tunnel and wire bufs parameters (git-fixes)
- IB/mlx5: Add missing error code (git-fixes)
- IB/mlx5: Add mutex destroy call to cap_mask_mutex mutex (git-fixes)
- IB/mlx5: Fix error unwinding when set_has_smi_cap fails (git-fixes)
- IB/mlx5: Return appropriate error code instead of ENOMEM (git-fixes)
- IB/umad: Return EIO in case of when device disassociated (git-fixes)
- IB/umad: Return EPOLLERR in case of when device disassociated (git-fixes)
- Input: wm97xx: Simplify resource management (git-fixes).
- KVM: remember position in kvm->vcpus array (bsc#1190972 LTC#194674).
- NFS: Ensure the server had an up to date ctime before renaming (git-fixes).
- NFSD: Fix the behavior of READ near OFFSET_MAX (bsc#1195957).
- NFSv4: Handle case where the lookup of a directory fails (git-fixes).
- NFSv4: nfs_atomic_open() can race when looking up a non-regular file (git-fixes).
- PM: hibernate: Remove register_nosave_region_late() (git-fixes).
- PM: s2idle: ACPI: Fix wakeup interrupts handling (git-fixes).
- PM: wakeup: simplify the output logic of pm_show_wakelocks() (git-fixes).
- RDMA/addr: Be strict with gid size (git-fixes)
- RDMA/bnxt_re: Fix a double free in bnxt_qplib_alloc_res (git-fixes)
- RDMA/bnxt_re: Fix error return code in bnxt_qplib_cq_process_terminal() (git-fixes)
- RDMA/bnxt_re: Set queue pair state when being queried (git-fixes)
- RDMA/cm: Fix an attempt to use non-valid pointer when cleaning timewait (git-fixes)
- RDMA/cma: Use correct address when leaving multicast group (bsc#1181147).
- RDMA/core: Always release restrack object (git-fixes)
- RDMA/core: Do not access cm_id after its destruction (git-fixes)
- RDMA/core: Do not indicate device ready when device enablement fails (git-fixes)
- RDMA/core: Fix corrupted SL on passive side (git-fixes)
- RDMA/core: Unify RoCE check and re-factor code (git-fixes)
- RDMA/cxgb4: Fix adapter LE hash errors while destroying ipv6 listening server (git-fixes)
- RDMA/cxgb4: Fix the reported max_recv_sge value (git-fixes)
- RDMA/cxgb4: Validate the number of CQEs (git-fixes)
- RDMA/cxgb4: add missing qpid increment (git-fixes)
- RDMA/cxgb4: check for ipv6 address properly while destroying listener (git-fixes)
- RDMA/hns: Add a check for current state before modifying QP (git-fixes)
- RDMA/hns: Remove the portn field in UD SQ WQE (git-fixes)
- RDMA/hns: Remove unnecessary access right set during INIT2INIT (git-fixes)
- RDMA/i40iw: Address an mmap handler exploit in i40iw (git-fixes)
- RDMA/i40iw: Fix error unwinding when i40iw_hmc_sd_one fails (git-fixes)
- RDMA/mlx5: Fix corruption of reg_pages in mlx5_ib_rereg_user_mr() (git-fixes)
- RDMA/mlx5: Fix potential race between destroy and CQE poll (git-fixes)
- RDMA/mlx5: Fix query DCT via DEVX (git-fixes)
- RDMA/mlx5: Fix type warning of sizeof in __mlx5_ib_alloc_counters() (git-fixes)
- RDMA/mlx5: Fix wrong free of blue flame register on error (git-fixes)
- RDMA/mlx5: Issue FW command to destroy SRQ on reentry (git-fixes)
- RDMA/mlx5: Recover from fatal event in dual port mode (git-fixes)
- RDMA/mlx5: Use the correct obj_id upon DEVX TIR creation (git-fixes)
- RDMA/ocrdma: Fix use after free in ocrdma_dealloc_ucontext_pd() (git-fixes)
- RDMA/rxe: Clear all QP fields if creation failed (git-fixes)
- RDMA/rxe: Compute PSN windows correctly (git-fixes)
- RDMA/rxe: Correct skb on loopback path (git-fixes)
- RDMA/rxe: Fix coding error in rxe_rcv_mcast_pkt (git-fixes)
- RDMA/rxe: Fix coding error in rxe_recv.c (git-fixes)
- RDMA/rxe: Fix missing kconfig dependency on CRYPTO (git-fixes)
- RDMA/rxe: Remove useless code in rxe_recv.c (git-fixes)
- RDMA/siw: Fix a use after free in siw_alloc_mr (git-fixes)
- RDMA/siw: Fix calculation of tx_valid_cpus size (git-fixes)
- RDMA/siw: Fix handling of zero-sized Read and Receive Queues. (git-fixes)
- RDMA/siw: Properly check send and receive CQ pointers (git-fixes)
- RDMA/siw: Release xarray entry (git-fixes)
- RDMA/ucma: Protect mc during concurrent multicast leaves (bsc#1181147).
- RDMA/usnic: Fix memleak in find_free_vf_and_create_qp_grp (git-fixes)
- RDMA/uverbs: Fix a NULL vs IS_ERR() bug (git-fixes)
- RDMA/uverbs: Tidy input validation of ib_uverbs_rereg_mr() (git-fixes)
- RMDA/sw: Do not allow drivers using dma_virt_ops on highmem configs (git-fixes)
- USB: core: Fix hang in usb_kill_urb by adding memory barriers (git-fixes).
- USB: serial: ch341: add support for GW Instek USB2.0-Serial devices (git-fixes).
- USB: serial: cp210x: add CPI Bulk Coin Recycler id (git-fixes).
- USB: serial: cp210x: add NCR Retail IO box id (git-fixes).
- USB: serial: ftdi_sio: add support for Brainboxes US-159/235/320 (git-fixes).
- USB: serial: mos7840: fix probe error handling (git-fixes).
- USB: serial: mos7840: remove duplicated 0xac24 device ID (git-fixes).
- USB: serial: option: add ZTE MF286D modem (git-fixes).
- ata: libata-core: Disable TRIM on M88V29 (git-fixes).
- ax25: improve the incomplete fix to avoid UAF and NPD bugs (git-fixes).
- blk-cgroup: fix missing put device in error path from blkg_conf_pref() (bsc#1195481).
- blk-mq: always allow reserved allocation in hctx_may_queue (bsc#1193787).
- blk-mq: avoid to iterate over stale request (bsc#1193787).
- blk-mq: clear stale request in tags->rq before freeing one request pool (bsc#1193787).
- blk-mq: clearing flush request reference in tags->rqs (bsc#1193787).
- blk-mq: do not grab rq's refcount in blk_mq_check_expired() (bsc#1193787 git-fixes).
- blk-mq: fix is_flush_rq (bsc#1193787 git-fixes).
- blk-mq: fix kernel panic during iterating over flush request (bsc#1193787 git-fixes).
- blk-mq: grab rq->refcount before calling ->fn in blk_mq_tagset_busy_iter (bsc#1193787).
- blk-mq: introduce blk_mq_set_request_complete (git-fixes).
- blk-mq: mark flush request as IDLE in flush_end_io() (bsc#1193787).
- blk-tag: Hide spin_lock (bsc#1193787).
- block: avoid double io accounting for flush request (bsc#1193787).
- block: do not send a rezise udev event for hidden block device (bsc#1193096).
- block: mark flush request as IDLE when it is really finished (bsc#1193787).
- bonding: pair enable_port with slave_arr_updates (git-fixes).
- bpf: Adjust BTF log size limit (git-fixes).
- bpf: Disallow BPF_LOG_KERNEL log level for bpf(BPF_BTF_LOAD) (git-fixes).
- btrfs: check for missing device in btrfs_trim_fs (bsc#1195701).
- btrfs: check worker before need_preemptive_reclaim (bsc#1196195).
- btrfs: do not do preemptive flushing if the majority is global rsv (bsc#1196195).
- btrfs: do not include the global rsv size in the preemptive used amount (bsc#1196195).
- btrfs: handle preemptive delalloc flushing slightly differently (bsc#1196195).
- btrfs: make sure SB_I_VERSION does not get unset by remount (bsc#1192210).
- btrfs: only clamp the first time we have to start flushing (bsc#1196195).
- btrfs: only ignore delalloc if delalloc is much smaller than ordered (bsc#1196195).
- btrfs: reduce the preemptive flushing threshold to 90% (bsc#1196195).
- btrfs: take into account global rsv in need_preemptive_reclaim (bsc#1196195).
- btrfs: use the global rsv size in the preemptive thresh calculation (bsc#1196195).
- ceph: properly put ceph_string reference after async create attempt (bsc#1195798).
- ceph: set pool_ns in new inode layout for async creates (bsc#1195799).
- dma-buf: heaps: Fix potential spectre v1 gadget (git-fixes).
- drm/amdgpu: fix logic inversion in check (git-fixes).
- drm/i915/gvt: Make DRM_I915_GVT depend on X86 (git-fixes).
- drm/i915/gvt: clean up kernel-doc in gtt.c (git-fixes).
- drm/i915/opregion: check port number bounds for SWSCI display power state (git-fixes).
- drm/i915/overlay: Prevent divide by zero bugs in scaling (git-fixes).
- drm/i915: Correctly populate use_sagv_wm for all pipes (git-fixes).
- drm/i915: Fix bw atomic check when switching between SAGV vs. no SAGV (git-fixes).
- drm/msm/dsi: Fix missing put_device() call in dsi_get_phy (git-fixes).
- drm/nouveau: fix off by one in BIOS boundary checking (git-fixes).
- drm/panel: simple: Assign data from panel_dpi_probe() correctly (git-fixes).
- drm/radeon: Fix backlight control on iMac 12,1 (git-fixes).
- drm/rockchip: dw_hdmi: Do not leave clock enabled in error case (git-fixes).
- drm/rockchip: vop: Correct RK3399 VOP register fields (git-fixes).
- drm/vc4: hdmi: Allow DBLCLK modes even if horz timing is odd (git-fixes).
- drm: panel-orientation-quirks: Add quirk for the 1Netbook OneXPlayer (git-fixes).
- ext4: check for inconsistent extents between index and leaf block (bsc#1194163 bsc#1196339).
- ext4: check for out-of-order index extents in ext4_valid_extent_entries() (bsc#1194163 bsc#1196339).
- ext4: fix an use-after-free issue about data=journal writeback mode (bsc#1195482).
- ext4: make sure quota gets properly shutdown on error (bsc#1195480).
- ext4: prevent partial update of the extent blocks (bsc#1194163 bsc#1196339).
- fsnotify: fix fsnotify hooks in pseudo filesystems (bsc#1195479).
- fsnotify: invalidate dcache before IN_DELETE event (bsc#1195478).
- gve: Add RX context (bsc#1191655).
- gve: Add a jumbo-frame device option (bsc#1191655).
- gve: Add consumed counts to ethtool stats (bsc#1191655).
- gve: Add optional metadata descriptor type GVE_TXD_MTD (bsc#1191655).
- gve: Correct order of processing device options (bsc#1191655).
- gve: Fix GFP flags when allocing pages (git-fixes).
- gve: Fix off by one in gve_tx_timeout() (bsc#1191655).
- gve: Implement packet continuation for RX (bsc#1191655).
- gve: Implement suspend/resume/shutdown (bsc#1191655).
- gve: Move the irq db indexes out of the ntfy block struct (bsc#1191655).
- gve: Recording rx queue before sending to napi (bsc#1191655).
- gve: Recover from queue stall due to missed IRQ (bsc#1191655).
- gve: Update gve_free_queue_page_list signature (bsc#1191655).
- gve: Use kvcalloc() instead of kvzalloc() (bsc#1191655).
- gve: fix for null pointer dereference (bsc#1191655).
- gve: fix the wrong AdminQ buffer queue index check (bsc#1176940).
- gve: fix unmatched u64_stats_update_end() (bsc#1191655).
- gve: remove memory barrier around seqno (bsc#1191655).
- i2c: brcmstb: fix support for DSL and CM variants (git-fixes).
- i40e: Fix for failed to init adminq while VF reset (git-fixes).
- i40e: Fix issue when maximum queues is exceeded (git-fixes).
- i40e: Fix queues reservation for XDP (git-fixes).
- i40e: Increase delay to 1 s after global EMP reset (git-fixes).
- i40e: fix unsigned stat widths (git-fixes).
- i40iw: Add support to make destroy QP synchronous (git-fixes)
- ibmvnic: Allow queueing resets during probe (bsc#1196516 ltc#196391).
- ibmvnic: clear fop when retrying probe (bsc#1196516 ltc#196391).
- ibmvnic: complete init_done on transport events (bsc#1196516 ltc#196391).
- ibmvnic: define flush_reset_queue helper (bsc#1196516 ltc#196391).
- ibmvnic: do not release napi in __ibmvnic_open() (bsc#1195668 ltc#195811).
- ibmvnic: free reset-work-item when flushing (bsc#1196516 ltc#196391).
- ibmvnic: init init_done_rc earlier (bsc#1196516 ltc#196391).
- ibmvnic: initialize rc before completing wait (bsc#1196516 ltc#196391).
- ibmvnic: register netdev after init of adapter (bsc#1196516 ltc#196391).
- ibmvnic: schedule failover only if vioctl fails (bsc#1196400 ltc#195815).
- ice: fix IPIP and SIT TSO offload (git-fixes).
- ice: fix an error code in ice_cfg_phy_fec() (jsc#SLE-12878).
- ima: Allow template selection with ima_template[_fmt]= after ima_hash= (git-fixes).
- ima: Do not print policy rule with inactive LSM labels (git-fixes).
- ima: Remove ima_policy file before directory (git-fixes).
- integrity: Make function integrity_add_key() static (git-fixes).
- integrity: check the return value of audit_log_start() (git-fixes).
- integrity: double check iint_cache was initialized (git-fixes).
- iommu/amd: Fix loop timeout issue in iommu_ga_log_enable() (git-fixes).
- iommu/amd: Remove useless irq affinity notifier (git-fixes).
- iommu/amd: Restore GA log/tail pointer on host resume (git-fixes).
- iommu/amd: X2apic mode: mask/unmask interrupts on suspend/resume (git-fixes).
- iommu/amd: X2apic mode: re-enable after resume (git-fixes).
- iommu/amd: X2apic mode: setup the INTX registers on mask/unmask (git-fixes).
- iommu/io-pgtable-arm-v7s: Add error handle for page table allocation failure (git-fixes).
- iommu/io-pgtable-arm: Fix table descriptor paddr formatting (git-fixes).
- iommu/iova: Fix race between FQ timeout and teardown (git-fixes).
- iommu/vt-d: Fix potential memory leak in intel_setup_irq_remapping() (git-fixes).
- iwlwifi: fix use-after-free (git-fixes).
- iwlwifi: pcie: fix locking when 'HW not ready' (git-fixes).
- iwlwifi: pcie: gen2: fix locking when 'HW not ready' (git-fixes).
- ixgbevf: Require large buffers for build_skb on 82599VF (git-fixes).
- kABI fixup after adding vcpu_idx to struct kvm_cpu (bsc#1190972 LTC#194674).
- kABI: Fix kABI for AMD IOMMU driver (git-fixes).
- kabi: Hide changes to s390/AP structures (jsc#SLE-20807).
- lib/iov_iter: initialize 'flags' in new pipe_buffer (bsc#1196584).
- libsubcmd: Fix use-after-free for realloc(..., 0) (git-fixes).
- md/raid5: fix oops during stripe resizing (bsc#1181588).
- misc: fastrpc: avoid double fput() on failed usercopy (git-fixes).
- mmc: sdhci-of-esdhc: Check for error num after setting mask (git-fixes).
- mtd: rawnand: brcmnand: Fixed incorrect sub-page ECC status (git-fixes).
- mtd: rawnand: gpmi: do not leak PM reference in error path (git-fixes).
- mtd: rawnand: qcom: Fix clock sequencing in qcom_nandc_probe() (git-fixes).
- net/ibmvnic: Cleanup workaround doing an EOI after partition migration (bsc#1089644 ltc#166495 ltc#165544 git-fixes).
- net/mlx5e: Fix handling of wrong devices during bond netevent (jsc#SLE-15172).
- net: macb: Align the dma and coherent dma masks (git-fixes).
- net: mdio: aspeed: Add missing MODULE_DEVICE_TABLE (bsc#1176447).
- net: phy: marvell: Fix MDI-x polarity setting in 88e1118-compatible PHYs (git-fixes).
- net: phy: marvell: Fix RGMII Tx/Rx delays setting in 88e1121-compatible PHYs (git-fixes).
- net: phy: marvell: configure RGMII delays for 88E1118 (git-fixes).
- net: usb: qmi_wwan: Add support for Dell DW5829e (git-fixes).
- nfp: flower: fix ida_idx not being released (bsc#1154353).
- nfsd: allow delegation state ids to be revoked and then freed (bsc#1192483).
- nfsd: allow lock state ids to be revoked and then freed (bsc#1192483).
- nfsd: allow open state ids to be revoked and then freed (bsc#1192483).
- nfsd: do not admin-revoke NSv4.0 state ids (bsc#1192483).
- nfsd: prepare for supporting admin-revocation of state (bsc#1192483).
- nvme-core: use list_add_tail_rcu instead of list_add_tail for nvme_init_ns_head (git-fixes).
- nvme-fabrics: avoid double completions in nvmf_fail_nonready_command (git-fixes).
- nvme-fabrics: fix state check in nvmf_ctlr_matches_baseopts() (bsc#1195012).
- nvme-fabrics: ignore invalid fast_io_fail_tmo values (git-fixes).
- nvme-fabrics: remove superfluous nvmf_host_put in nvmf_parse_options (git-fixes).
- nvme-multipath: fix ANA state updates when a namespace is not present (git-fixes).
- nvme-tcp: fix data digest pointer calculation (git-fixes).
- nvme-tcp: fix incorrect h2cdata pdu offset accounting (git-fixes).
- nvme-tcp: fix memory leak when freeing a queue (git-fixes).
- nvme-tcp: fix possible use-after-completion (git-fixes).
- nvme-tcp: validate R2T PDU in nvme_tcp_handle_r2t() (git-fixes).
- nvme: also mark passthrough-only namespaces ready in nvme_update_ns_info (git-fixes).
- nvme: do not return an error from nvme_configure_metadata (git-fixes).
- nvme: fix use after free when disconnecting a reconnecting ctrl (git-fixes).
- nvme: introduce a nvme_host_path_error helper (git-fixes).
- nvme: let namespace probing continue for unsupported features (git-fixes).
- nvme: refactor ns->ctrl by request (git-fixes).
- pinctrl: intel: Fix a glitch when updating IRQ flags on a preconfigured line (git-fixes).
- pinctrl: intel: fix unexpected interrupt (git-fixes).
- powerpc/64: Move paca allocation later in boot (bsc#1190812).
- powerpc/64s: Fix debugfs_simple_attr.cocci warnings (bsc#1157038 bsc#1157923 ltc#182612 git-fixes).
- powerpc/perf: Fix power_pmu_disable to call clear_pmi_irq_pending only if PMI is pending (bsc#1156395).
- powerpc/pseries/ddw: Revert 'Extend upper limit for huge DMA window for persistent memory' (bsc#1195995 ltc#196394).
- powerpc/pseries: read the lpar name from the firmware (bsc#1187716 ltc#193451).
- powerpc: Set crashkernel offset to mid of RMA region (bsc#1190812).
- powerpc: add link stack flush mitigation status in debugfs (bsc#1157038 bsc#1157923 ltc#182612 git-fixes).
- rpmsg: char: Fix race between the release of rpmsg_ctrldev and cdev (git-fixes).
- rpmsg: char: Fix race between the release of rpmsg_eptdev and cdev (git-fixes).
- s390/AP: support new dynamic AP bus size limit (jsc#SLE-20807).
- s390/bpf: Fix 64-bit subtraction of the -0x80000000 constant (git-fixes).
- s390/bpf: Fix optimizing out zero-extensions (git-fixes).
- s390/cio: make ccw_device_dma_* more robust (bsc#1193243 LTC#195549).
- s390/cio: verify the driver availability for path_event call (bsc#1195928 LTC#196418).
- s390/cpumf: Support for CPU Measurement Facility CSVN 7 (bsc#1195081 LTC#196088).
- s390/cpumf: Support for CPU Measurement Sampling Facility LS bit (bsc#1195081 LTC#196088).
- s390/pci: add s390_iommu_aperture kernel parameter (bsc#1193233 LTC#195540).
- s390/pci: move pseudo-MMIO to prevent MIO overlap (bsc#1194967 LTC#196028).
- s390/protvirt: fix error return code in uv_info_init() (jsc#SLE-22135).
- s390/sclp: fix Secure-IPL facility detection (bsc#1191741 LTC#194816).
- s390/uv: add prot virt guest/host indication files (jsc#SLE-22135).
- s390/uv: fix prot virt host indication compilation (jsc#SLE-22135).
- scripts/dtc: only append to HOST_EXTRACFLAGS instead of overwriting (git-fixes).
- scsi: core: Add a new error code DID_TRANSPORT_MARGINAL in scsi.h (bsc#1195506).
- scsi: core: Add limitless cmd retry support (bsc#1195506).
- scsi: core: No retries on abort success (bsc#1195506).
- scsi: kABI fix for 'eh_should_retry_cmd' (bsc#1195506).
- scsi: lpfc: Add support for eh_should_retry_cmd() (bsc#1195506).
- scsi: lpfc: Fix pt2pt NVMe PRLI reject LOGO loop (bsc#1189126).
- scsi: qla2xxx: Add devids and conditionals for 28xx (bsc#1195823).
- scsi: qla2xxx: Add marginal path handling support (bsc#1195506).
- scsi: qla2xxx: Add ql2xnvme_queues module param to configure number of NVMe queues (bsc#1195823).
- scsi: qla2xxx: Add qla2x00_async_done() for async routines (bsc#1195823).
- scsi: qla2xxx: Add retry for exec firmware (bsc#1195823).
- scsi: qla2xxx: Check for firmware dump already collected (bsc#1195823).
- scsi: qla2xxx: Fix T10 PI tag escape and IP guard options for 28XX adapters (bsc#1195823).
- scsi: qla2xxx: Fix device reconnect in loop topology (bsc#1195823).
- scsi: qla2xxx: Fix premature hw access after PCI error (bsc#1195823).
- scsi: qla2xxx: Fix scheduling while atomic (bsc#1195823).
- scsi: qla2xxx: Fix stuck session in gpdb (bsc#1195823).
- scsi: qla2xxx: Fix unmap of already freed sgl (bsc#1195823).
- scsi: qla2xxx: Fix warning for missing error code (bsc#1195823).
- scsi: qla2xxx: Fix warning message due to adisc being flushed (bsc#1195823).
- scsi: qla2xxx: Fix wrong FDMI data for 64G adapter (bsc#1195823).
- scsi: qla2xxx: Implement ref count for SRB (bsc#1195823).
- scsi: qla2xxx: Refactor asynchronous command initialization (bsc#1195823).
- scsi: qla2xxx: Remove a declaration (bsc#1195823).
- scsi: qla2xxx: Remove unused qla_sess_op_cmd_list from scsi_qla_host_t (bsc#1195823).
- scsi: qla2xxx: Return -ENOMEM if kzalloc() fails (bsc#1195823).
- scsi: qla2xxx: Suppress a kernel complaint in qla_create_qpair() (bsc#1195823).
- scsi: qla2xxx: Update version to 10.02.07.200-k (bsc#1195823).
- scsi: qla2xxx: Update version to 10.02.07.300-k (bsc#1195823).
- scsi: qla2xxx: edif: Fix clang warning (bsc#1195823).
- scsi: qla2xxx: edif: Fix inconsistent check of db_flags (bsc#1195823).
- scsi: qla2xxx: edif: Reduce connection thrash (bsc#1195823).
- scsi: qla2xxx: edif: Replace list_for_each_safe with list_for_each_entry_safe (bsc#1195823).
- scsi: qla2xxx: edif: Tweak trace message (bsc#1195823).
- scsi: scsi_transport_fc: Add a new rport state FC_PORTSTATE_MARGINAL (bsc#1195506).
- scsi: scsi_transport_fc: Add store capability to rport port_state in sysfs (bsc#1195506).
- scsi: target: iscsi: Fix cmd abort fabric stop race (bsc#1195286).
- scsi: zfcp: Fix failed recovery on gone remote port with non-NPIV FCP devices (bsc#1195378 LTC#196244).
- scsi_transport_fc: kabi fix blank out FC_PORTSTATE_MARGINAL (bsc#1195506).
- spi: bcm-qspi: check for valid cs before applying chip select (git-fixes).
- spi: mediatek: Avoid NULL pointer crash in interrupt (git-fixes).
- spi: meson-spicc: add IRQ check in meson_spicc_probe (git-fixes).
- staging/fbtft: Fix backlight (git-fixes).
- staging: fbtft: Fix error path in fbtft_driver_module_init() (git-fixes).
- tracing: Do not inc err_log entry count if entry allocation fails (git-fixes).
- tracing: Dump stacktrace trigger to the corresponding instance (git-fixes).
- tracing: Fix smatch warning for null glob in event_hist_trigger_parse() (git-fixes).
- tracing: Have traceon and traceoff trigger honor the instance (git-fixes).
- tracing: Propagate is_signed to expression (git-fixes).
- tty: Add support for Brainboxes UC cards (git-fixes).
- udf: Fix NULL ptr deref when converting from inline format (bsc#1195476).
- udf: Restore i_lenAlloc when inode expansion fails (bsc#1195477).
- usb-storage: Add unusual-devs entry for VL817 USB-SATA bridge (git-fixes).
- usb: dwc2: Fix NULL qh in dwc2_queue_transaction (git-fixes).
- usb: dwc2: gadget: do not try to disable ep0 in dwc2_hsotg_suspend (git-fixes).
- usb: dwc3: do not set gadget->is_otg flag (git-fixes).
- usb: dwc3: gadget: Prevent core from processing stale TRBs (git-fixes).
- usb: f_fs: Fix use-after-free for epfile (git-fixes).
- usb: gadget: f_uac2: Define specific wTerminalType (git-fixes).
- usb: gadget: rndis: check size of RNDIS_MSG_SET command (git-fixes).
- usb: gadget: s3c: remove unused 'udc' variable (git-fixes).
- usb: gadget: udc: renesas_usb3: Fix host to USB_ROLE_NONE transition (git-fixes).
- usb: host: ehci-tegra: Fix error handling in tegra_ehci_probe() (git-fixes).
- usb: ulpi: Call of_node_put correctly (git-fixes).
- usb: ulpi: Move of_node_put to ulpi_dev_release (git-fixes).
- xhci-pci: Allow host runtime PM as default for Intel Alpine Ridge LP (git-fixes).
Patchnames
SUSE-2022-755,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-755
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 15 SP3 Azure kernel was updated to receive various security and bugfixes.\n\n\nTransient execution side-channel attacks attacking the Branch History Buffer (BHB),\nnamed \u0027Branch Target Injection\u0027 and \u0027Intra-Mode Branch History Injection\u0027 are now mitigated.\n\nThe following security bugs were fixed:\n\n- CVE-2022-0847: Fixed a vulnerability were a local attackers could overwrite data in arbitrary (read-only) files (bsc#1196584).\n- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).\n- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).\n- CVE-2022-25375: The RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command. Attackers can obtain sensitive information from kernel memory (bsc#1196235).\n- CVE-2022-0516: Fixed missing check in ioctl related to KVM in s390 allows kernel memory read/write (bsc#1195516).\n- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).\n\nThe following non-security bugs were fixed:\n\n- ACPI/IORT: Check node revision for PMCG resources (git-fixes).\n- ALSA: hda/realtek: Add missing fixup-model entry for Gigabyte X570 ALC1220 quirks (git-fixes).\n- ALSA: hda/realtek: Add quirk for ASUS GU603 (git-fixes).\n- ALSA: hda/realtek: Fix silent output on Gigabyte X570 Aorus Xtreme after reboot from Windows (git-fixes).\n- ALSA: hda/realtek: Fix silent output on Gigabyte X570S Aorus Master (newer chipset) (git-fixes).\n- ALSA: hda: Fix missing codec probe on Shenker Dock 15 (git-fixes).\n- ALSA: hda: Fix regression on forced probe mask option (git-fixes).\n- ALSA: usb-audio: Correct quirk for VF0770 (git-fixes).\n- ALSA: usb-audio: initialize variables that could ignore errors (git-fixes).\n- ASoC: Revert \u0027ASoC: mediatek: Check for error clk pointer\u0027 (git-fixes).\n- ASoC: cpcap: Check for NULL pointer after calling of_get_child_by_name (git-fixes).\n- ASoC: fsl: Add missing error handling in pcm030_fabric_probe (git-fixes).\n- ASoC: max9759: fix underflow in speaker_gain_control_put() (git-fixes).\n- ASoC: ops: Fix stereo change notifications in snd_soc_put_volsw() (git-fixes).\n- ASoC: ops: Fix stereo change notifications in snd_soc_put_volsw_range() (git-fixes).\n- ASoC: ops: Reject out of bounds values in snd_soc_put_volsw() (git-fixes).\n- ASoC: ops: Reject out of bounds values in snd_soc_put_volsw_sx() (git-fixes).\n- ASoC: ops: Reject out of bounds values in snd_soc_put_xr_sx() (git-fixes).\n- ASoC: xilinx: xlnx_formatter_pcm: Make buffer bytes multiple of period bytes (git-fixes).\n- Align s390 NVME target options with other architectures (bsc#1188404, jsc#SLE-22494).\n- Bluetooth: refactor malicious adv data check (git-fixes).\n- EDAC/xgene: Fix deferred probing (bsc#1178134).\n- HID:Add support for UGTABLET WP5540 (git-fixes).\n- IB/cm: Avoid a loop when device has 255 ports (git-fixes)\n- IB/cma: Do not send IGMP leaves for sendonly Multicast groups (git-fixes).\n- IB/hfi1: Fix AIP early init panic (jsc#SLE-13208).\n- IB/hfi1: Fix error return code in parse_platform_config() (git-fixes)\n- IB/hfi1: Use kzalloc() for mmu_rb_handler allocation (git-fixes)\n- IB/isert: Fix a use after free in isert_connect_request (git-fixes)\n- IB/mlx4: Separate tunnel and wire bufs parameters (git-fixes)\n- IB/mlx5: Add missing error code (git-fixes)\n- IB/mlx5: Add mutex destroy call to cap_mask_mutex mutex (git-fixes)\n- IB/mlx5: Fix error unwinding when set_has_smi_cap fails (git-fixes)\n- IB/mlx5: Return appropriate error code instead of ENOMEM (git-fixes)\n- IB/umad: Return EIO in case of when device disassociated (git-fixes)\n- IB/umad: Return EPOLLERR in case of when device disassociated (git-fixes)\n- Input: wm97xx: Simplify resource management (git-fixes).\n- KVM: remember position in kvm-\u003evcpus array (bsc#1190972 LTC#194674).\n- NFS: Ensure the server had an up to date ctime before renaming (git-fixes).\n- NFSD: Fix the behavior of READ near OFFSET_MAX (bsc#1195957).\n- NFSv4: Handle case where the lookup of a directory fails (git-fixes).\n- NFSv4: nfs_atomic_open() can race when looking up a non-regular file (git-fixes).\n- PM: hibernate: Remove register_nosave_region_late() (git-fixes).\n- PM: s2idle: ACPI: Fix wakeup interrupts handling (git-fixes).\n- PM: wakeup: simplify the output logic of pm_show_wakelocks() (git-fixes).\n- RDMA/addr: Be strict with gid size (git-fixes)\n- RDMA/bnxt_re: Fix a double free in bnxt_qplib_alloc_res (git-fixes)\n- RDMA/bnxt_re: Fix error return code in bnxt_qplib_cq_process_terminal() (git-fixes)\n- RDMA/bnxt_re: Set queue pair state when being queried (git-fixes)\n- RDMA/cm: Fix an attempt to use non-valid pointer when cleaning timewait (git-fixes)\n- RDMA/cma: Use correct address when leaving multicast group (bsc#1181147).\n- RDMA/core: Always release restrack object (git-fixes)\n- RDMA/core: Do not access cm_id after its destruction (git-fixes)\n- RDMA/core: Do not indicate device ready when device enablement fails (git-fixes)\n- RDMA/core: Fix corrupted SL on passive side (git-fixes)\n- RDMA/core: Unify RoCE check and re-factor code (git-fixes)\n- RDMA/cxgb4: Fix adapter LE hash errors while destroying ipv6 listening server (git-fixes)\n- RDMA/cxgb4: Fix the reported max_recv_sge value (git-fixes)\n- RDMA/cxgb4: Validate the number of CQEs (git-fixes)\n- RDMA/cxgb4: add missing qpid increment (git-fixes)\n- RDMA/cxgb4: check for ipv6 address properly while destroying listener (git-fixes)\n- RDMA/hns: Add a check for current state before modifying QP (git-fixes)\n- RDMA/hns: Remove the portn field in UD SQ WQE (git-fixes)\n- RDMA/hns: Remove unnecessary access right set during INIT2INIT (git-fixes)\n- RDMA/i40iw: Address an mmap handler exploit in i40iw (git-fixes)\n- RDMA/i40iw: Fix error unwinding when i40iw_hmc_sd_one fails (git-fixes)\n- RDMA/mlx5: Fix corruption of reg_pages in mlx5_ib_rereg_user_mr() (git-fixes)\n- RDMA/mlx5: Fix potential race between destroy and CQE poll (git-fixes)\n- RDMA/mlx5: Fix query DCT via DEVX (git-fixes)\n- RDMA/mlx5: Fix type warning of sizeof in __mlx5_ib_alloc_counters() (git-fixes)\n- RDMA/mlx5: Fix wrong free of blue flame register on error (git-fixes)\n- RDMA/mlx5: Issue FW command to destroy SRQ on reentry (git-fixes)\n- RDMA/mlx5: Recover from fatal event in dual port mode (git-fixes)\n- RDMA/mlx5: Use the correct obj_id upon DEVX TIR creation (git-fixes)\n- RDMA/ocrdma: Fix use after free in ocrdma_dealloc_ucontext_pd() (git-fixes)\n- RDMA/rxe: Clear all QP fields if creation failed (git-fixes)\n- RDMA/rxe: Compute PSN windows correctly (git-fixes)\n- RDMA/rxe: Correct skb on loopback path (git-fixes)\n- RDMA/rxe: Fix coding error in rxe_rcv_mcast_pkt (git-fixes)\n- RDMA/rxe: Fix coding error in rxe_recv.c (git-fixes)\n- RDMA/rxe: Fix missing kconfig dependency on CRYPTO (git-fixes)\n- RDMA/rxe: Remove useless code in rxe_recv.c (git-fixes)\n- RDMA/siw: Fix a use after free in siw_alloc_mr (git-fixes)\n- RDMA/siw: Fix calculation of tx_valid_cpus size (git-fixes)\n- RDMA/siw: Fix handling of zero-sized Read and Receive Queues. (git-fixes)\n- RDMA/siw: Properly check send and receive CQ pointers (git-fixes)\n- RDMA/siw: Release xarray entry (git-fixes)\n- RDMA/ucma: Protect mc during concurrent multicast leaves (bsc#1181147).\n- RDMA/usnic: Fix memleak in find_free_vf_and_create_qp_grp (git-fixes)\n- RDMA/uverbs: Fix a NULL vs IS_ERR() bug (git-fixes)\n- RDMA/uverbs: Tidy input validation of ib_uverbs_rereg_mr() (git-fixes)\n- RMDA/sw: Do not allow drivers using dma_virt_ops on highmem configs (git-fixes)\n- USB: core: Fix hang in usb_kill_urb by adding memory barriers (git-fixes).\n- USB: serial: ch341: add support for GW Instek USB2.0-Serial devices (git-fixes).\n- USB: serial: cp210x: add CPI Bulk Coin Recycler id (git-fixes).\n- USB: serial: cp210x: add NCR Retail IO box id (git-fixes).\n- USB: serial: ftdi_sio: add support for Brainboxes US-159/235/320 (git-fixes).\n- USB: serial: mos7840: fix probe error handling (git-fixes).\n- USB: serial: mos7840: remove duplicated 0xac24 device ID (git-fixes).\n- USB: serial: option: add ZTE MF286D modem (git-fixes).\n- ata: libata-core: Disable TRIM on M88V29 (git-fixes).\n- ax25: improve the incomplete fix to avoid UAF and NPD bugs (git-fixes).\n- blk-cgroup: fix missing put device in error path from blkg_conf_pref() (bsc#1195481).\n- blk-mq: always allow reserved allocation in hctx_may_queue (bsc#1193787).\n- blk-mq: avoid to iterate over stale request (bsc#1193787).\n- blk-mq: clear stale request in tags-\u003erq before freeing one request pool (bsc#1193787).\n- blk-mq: clearing flush request reference in tags-\u003erqs (bsc#1193787).\n- blk-mq: do not grab rq\u0027s refcount in blk_mq_check_expired() (bsc#1193787 git-fixes).\n- blk-mq: fix is_flush_rq (bsc#1193787 git-fixes).\n- blk-mq: fix kernel panic during iterating over flush request (bsc#1193787 git-fixes).\n- blk-mq: grab rq-\u003erefcount before calling -\u003efn in blk_mq_tagset_busy_iter (bsc#1193787).\n- blk-mq: introduce blk_mq_set_request_complete (git-fixes).\n- blk-mq: mark flush request as IDLE in flush_end_io() (bsc#1193787).\n- blk-tag: Hide spin_lock (bsc#1193787).\n- block: avoid double io accounting for flush request (bsc#1193787).\n- block: do not send a rezise udev event for hidden block device (bsc#1193096).\n- block: mark flush request as IDLE when it is really finished (bsc#1193787).\n- bonding: pair enable_port with slave_arr_updates (git-fixes).\n- bpf: Adjust BTF log size limit (git-fixes).\n- bpf: Disallow BPF_LOG_KERNEL log level for bpf(BPF_BTF_LOAD) (git-fixes).\n- btrfs: check for missing device in btrfs_trim_fs (bsc#1195701).\n- btrfs: check worker before need_preemptive_reclaim (bsc#1196195).\n- btrfs: do not do preemptive flushing if the majority is global rsv (bsc#1196195).\n- btrfs: do not include the global rsv size in the preemptive used amount (bsc#1196195).\n- btrfs: handle preemptive delalloc flushing slightly differently (bsc#1196195).\n- btrfs: make sure SB_I_VERSION does not get unset by remount (bsc#1192210).\n- btrfs: only clamp the first time we have to start flushing (bsc#1196195).\n- btrfs: only ignore delalloc if delalloc is much smaller than ordered (bsc#1196195).\n- btrfs: reduce the preemptive flushing threshold to 90% (bsc#1196195).\n- btrfs: take into account global rsv in need_preemptive_reclaim (bsc#1196195).\n- btrfs: use the global rsv size in the preemptive thresh calculation (bsc#1196195).\n- ceph: properly put ceph_string reference after async create attempt (bsc#1195798).\n- ceph: set pool_ns in new inode layout for async creates (bsc#1195799).\n- dma-buf: heaps: Fix potential spectre v1 gadget (git-fixes).\n- drm/amdgpu: fix logic inversion in check (git-fixes).\n- drm/i915/gvt: Make DRM_I915_GVT depend on X86 (git-fixes).\n- drm/i915/gvt: clean up kernel-doc in gtt.c (git-fixes).\n- drm/i915/opregion: check port number bounds for SWSCI display power state (git-fixes).\n- drm/i915/overlay: Prevent divide by zero bugs in scaling (git-fixes).\n- drm/i915: Correctly populate use_sagv_wm for all pipes (git-fixes).\n- drm/i915: Fix bw atomic check when switching between SAGV vs. no SAGV (git-fixes).\n- drm/msm/dsi: Fix missing put_device() call in dsi_get_phy (git-fixes).\n- drm/nouveau: fix off by one in BIOS boundary checking (git-fixes).\n- drm/panel: simple: Assign data from panel_dpi_probe() correctly (git-fixes).\n- drm/radeon: Fix backlight control on iMac 12,1 (git-fixes).\n- drm/rockchip: dw_hdmi: Do not leave clock enabled in error case (git-fixes).\n- drm/rockchip: vop: Correct RK3399 VOP register fields (git-fixes).\n- drm/vc4: hdmi: Allow DBLCLK modes even if horz timing is odd (git-fixes).\n- drm: panel-orientation-quirks: Add quirk for the 1Netbook OneXPlayer (git-fixes).\n- ext4: check for inconsistent extents between index and leaf block (bsc#1194163 bsc#1196339).\n- ext4: check for out-of-order index extents in ext4_valid_extent_entries() (bsc#1194163 bsc#1196339).\n- ext4: fix an use-after-free issue about data=journal writeback mode (bsc#1195482).\n- ext4: make sure quota gets properly shutdown on error (bsc#1195480).\n- ext4: prevent partial update of the extent blocks (bsc#1194163 bsc#1196339).\n- fsnotify: fix fsnotify hooks in pseudo filesystems (bsc#1195479).\n- fsnotify: invalidate dcache before IN_DELETE event (bsc#1195478).\n- gve: Add RX context (bsc#1191655).\n- gve: Add a jumbo-frame device option (bsc#1191655).\n- gve: Add consumed counts to ethtool stats (bsc#1191655).\n- gve: Add optional metadata descriptor type GVE_TXD_MTD (bsc#1191655).\n- gve: Correct order of processing device options (bsc#1191655).\n- gve: Fix GFP flags when allocing pages (git-fixes).\n- gve: Fix off by one in gve_tx_timeout() (bsc#1191655).\n- gve: Implement packet continuation for RX (bsc#1191655).\n- gve: Implement suspend/resume/shutdown (bsc#1191655).\n- gve: Move the irq db indexes out of the ntfy block struct (bsc#1191655).\n- gve: Recording rx queue before sending to napi (bsc#1191655).\n- gve: Recover from queue stall due to missed IRQ (bsc#1191655).\n- gve: Update gve_free_queue_page_list signature (bsc#1191655).\n- gve: Use kvcalloc() instead of kvzalloc() (bsc#1191655).\n- gve: fix for null pointer dereference (bsc#1191655).\n- gve: fix the wrong AdminQ buffer queue index check (bsc#1176940).\n- gve: fix unmatched u64_stats_update_end() (bsc#1191655).\n- gve: remove memory barrier around seqno (bsc#1191655).\n- i2c: brcmstb: fix support for DSL and CM variants (git-fixes).\n- i40e: Fix for failed to init adminq while VF reset (git-fixes).\n- i40e: Fix issue when maximum queues is exceeded (git-fixes).\n- i40e: Fix queues reservation for XDP (git-fixes).\n- i40e: Increase delay to 1 s after global EMP reset (git-fixes).\n- i40e: fix unsigned stat widths (git-fixes).\n- i40iw: Add support to make destroy QP synchronous (git-fixes)\n- ibmvnic: Allow queueing resets during probe (bsc#1196516 ltc#196391).\n- ibmvnic: clear fop when retrying probe (bsc#1196516 ltc#196391).\n- ibmvnic: complete init_done on transport events (bsc#1196516 ltc#196391).\n- ibmvnic: define flush_reset_queue helper (bsc#1196516 ltc#196391).\n- ibmvnic: do not release napi in __ibmvnic_open() (bsc#1195668 ltc#195811).\n- ibmvnic: free reset-work-item when flushing (bsc#1196516 ltc#196391).\n- ibmvnic: init init_done_rc earlier (bsc#1196516 ltc#196391).\n- ibmvnic: initialize rc before completing wait (bsc#1196516 ltc#196391).\n- ibmvnic: register netdev after init of adapter (bsc#1196516 ltc#196391).\n- ibmvnic: schedule failover only if vioctl fails (bsc#1196400 ltc#195815).\n- ice: fix IPIP and SIT TSO offload (git-fixes).\n- ice: fix an error code in ice_cfg_phy_fec() (jsc#SLE-12878).\n- ima: Allow template selection with ima_template[_fmt]= after ima_hash= (git-fixes).\n- ima: Do not print policy rule with inactive LSM labels (git-fixes).\n- ima: Remove ima_policy file before directory (git-fixes).\n- integrity: Make function integrity_add_key() static (git-fixes).\n- integrity: check the return value of audit_log_start() (git-fixes).\n- integrity: double check iint_cache was initialized (git-fixes).\n- iommu/amd: Fix loop timeout issue in iommu_ga_log_enable() (git-fixes).\n- iommu/amd: Remove useless irq affinity notifier (git-fixes).\n- iommu/amd: Restore GA log/tail pointer on host resume (git-fixes).\n- iommu/amd: X2apic mode: mask/unmask interrupts on suspend/resume (git-fixes).\n- iommu/amd: X2apic mode: re-enable after resume (git-fixes).\n- iommu/amd: X2apic mode: setup the INTX registers on mask/unmask (git-fixes).\n- iommu/io-pgtable-arm-v7s: Add error handle for page table allocation failure (git-fixes).\n- iommu/io-pgtable-arm: Fix table descriptor paddr formatting (git-fixes).\n- iommu/iova: Fix race between FQ timeout and teardown (git-fixes).\n- iommu/vt-d: Fix potential memory leak in intel_setup_irq_remapping() (git-fixes).\n- iwlwifi: fix use-after-free (git-fixes).\n- iwlwifi: pcie: fix locking when \u0027HW not ready\u0027 (git-fixes).\n- iwlwifi: pcie: gen2: fix locking when \u0027HW not ready\u0027 (git-fixes).\n- ixgbevf: Require large buffers for build_skb on 82599VF (git-fixes).\n- kABI fixup after adding vcpu_idx to struct kvm_cpu (bsc#1190972 LTC#194674).\n- kABI: Fix kABI for AMD IOMMU driver (git-fixes).\n- kabi: Hide changes to s390/AP structures (jsc#SLE-20807).\n- lib/iov_iter: initialize \u0027flags\u0027 in new pipe_buffer (bsc#1196584).\n- libsubcmd: Fix use-after-free for realloc(..., 0) (git-fixes).\n- md/raid5: fix oops during stripe resizing (bsc#1181588).\n- misc: fastrpc: avoid double fput() on failed usercopy (git-fixes).\n- mmc: sdhci-of-esdhc: Check for error num after setting mask (git-fixes).\n- mtd: rawnand: brcmnand: Fixed incorrect sub-page ECC status (git-fixes).\n- mtd: rawnand: gpmi: do not leak PM reference in error path (git-fixes).\n- mtd: rawnand: qcom: Fix clock sequencing in qcom_nandc_probe() (git-fixes).\n- net/ibmvnic: Cleanup workaround doing an EOI after partition migration (bsc#1089644 ltc#166495 ltc#165544 git-fixes).\n- net/mlx5e: Fix handling of wrong devices during bond netevent (jsc#SLE-15172).\n- net: macb: Align the dma and coherent dma masks (git-fixes).\n- net: mdio: aspeed: Add missing MODULE_DEVICE_TABLE (bsc#1176447).\n- net: phy: marvell: Fix MDI-x polarity setting in 88e1118-compatible PHYs (git-fixes).\n- net: phy: marvell: Fix RGMII Tx/Rx delays setting in 88e1121-compatible PHYs (git-fixes).\n- net: phy: marvell: configure RGMII delays for 88E1118 (git-fixes).\n- net: usb: qmi_wwan: Add support for Dell DW5829e (git-fixes).\n- nfp: flower: fix ida_idx not being released (bsc#1154353).\n- nfsd: allow delegation state ids to be revoked and then freed (bsc#1192483).\n- nfsd: allow lock state ids to be revoked and then freed (bsc#1192483).\n- nfsd: allow open state ids to be revoked and then freed (bsc#1192483).\n- nfsd: do not admin-revoke NSv4.0 state ids (bsc#1192483).\n- nfsd: prepare for supporting admin-revocation of state (bsc#1192483).\n- nvme-core: use list_add_tail_rcu instead of list_add_tail for nvme_init_ns_head (git-fixes).\n- nvme-fabrics: avoid double completions in nvmf_fail_nonready_command (git-fixes).\n- nvme-fabrics: fix state check in nvmf_ctlr_matches_baseopts() (bsc#1195012).\n- nvme-fabrics: ignore invalid fast_io_fail_tmo values (git-fixes).\n- nvme-fabrics: remove superfluous nvmf_host_put in nvmf_parse_options (git-fixes).\n- nvme-multipath: fix ANA state updates when a namespace is not present (git-fixes).\n- nvme-tcp: fix data digest pointer calculation (git-fixes).\n- nvme-tcp: fix incorrect h2cdata pdu offset accounting (git-fixes).\n- nvme-tcp: fix memory leak when freeing a queue (git-fixes).\n- nvme-tcp: fix possible use-after-completion (git-fixes).\n- nvme-tcp: validate R2T PDU in nvme_tcp_handle_r2t() (git-fixes).\n- nvme: also mark passthrough-only namespaces ready in nvme_update_ns_info (git-fixes).\n- nvme: do not return an error from nvme_configure_metadata (git-fixes).\n- nvme: fix use after free when disconnecting a reconnecting ctrl (git-fixes).\n- nvme: introduce a nvme_host_path_error helper (git-fixes).\n- nvme: let namespace probing continue for unsupported features (git-fixes).\n- nvme: refactor ns-\u003ectrl by request (git-fixes).\n- pinctrl: intel: Fix a glitch when updating IRQ flags on a preconfigured line (git-fixes).\n- pinctrl: intel: fix unexpected interrupt (git-fixes).\n- powerpc/64: Move paca allocation later in boot (bsc#1190812).\n- powerpc/64s: Fix debugfs_simple_attr.cocci warnings (bsc#1157038 bsc#1157923 ltc#182612 git-fixes).\n- powerpc/perf: Fix power_pmu_disable to call clear_pmi_irq_pending only if PMI is pending (bsc#1156395).\n- powerpc/pseries/ddw: Revert \u0027Extend upper limit for huge DMA window for persistent memory\u0027 (bsc#1195995 ltc#196394).\n- powerpc/pseries: read the lpar name from the firmware (bsc#1187716 ltc#193451).\n- powerpc: Set crashkernel offset to mid of RMA region (bsc#1190812).\n- powerpc: add link stack flush mitigation status in debugfs (bsc#1157038 bsc#1157923 ltc#182612 git-fixes).\n- rpmsg: char: Fix race between the release of rpmsg_ctrldev and cdev (git-fixes).\n- rpmsg: char: Fix race between the release of rpmsg_eptdev and cdev (git-fixes).\n- s390/AP: support new dynamic AP bus size limit (jsc#SLE-20807).\n- s390/bpf: Fix 64-bit subtraction of the -0x80000000 constant (git-fixes).\n- s390/bpf: Fix optimizing out zero-extensions (git-fixes).\n- s390/cio: make ccw_device_dma_* more robust (bsc#1193243 LTC#195549).\n- s390/cio: verify the driver availability for path_event call (bsc#1195928 LTC#196418).\n- s390/cpumf: Support for CPU Measurement Facility CSVN 7 (bsc#1195081 LTC#196088).\n- s390/cpumf: Support for CPU Measurement Sampling Facility LS bit (bsc#1195081 LTC#196088).\n- s390/pci: add s390_iommu_aperture kernel parameter (bsc#1193233 LTC#195540).\n- s390/pci: move pseudo-MMIO to prevent MIO overlap (bsc#1194967 LTC#196028).\n- s390/protvirt: fix error return code in uv_info_init() (jsc#SLE-22135).\n- s390/sclp: fix Secure-IPL facility detection (bsc#1191741 LTC#194816).\n- s390/uv: add prot virt guest/host indication files (jsc#SLE-22135).\n- s390/uv: fix prot virt host indication compilation (jsc#SLE-22135).\n- scripts/dtc: only append to HOST_EXTRACFLAGS instead of overwriting (git-fixes).\n- scsi: core: Add a new error code DID_TRANSPORT_MARGINAL in scsi.h (bsc#1195506).\n- scsi: core: Add limitless cmd retry support (bsc#1195506).\n- scsi: core: No retries on abort success (bsc#1195506).\n- scsi: kABI fix for \u0027eh_should_retry_cmd\u0027 (bsc#1195506).\n- scsi: lpfc: Add support for eh_should_retry_cmd() (bsc#1195506).\n- scsi: lpfc: Fix pt2pt NVMe PRLI reject LOGO loop (bsc#1189126).\n- scsi: qla2xxx: Add devids and conditionals for 28xx (bsc#1195823).\n- scsi: qla2xxx: Add marginal path handling support (bsc#1195506).\n- scsi: qla2xxx: Add ql2xnvme_queues module param to configure number of NVMe queues (bsc#1195823).\n- scsi: qla2xxx: Add qla2x00_async_done() for async routines (bsc#1195823).\n- scsi: qla2xxx: Add retry for exec firmware (bsc#1195823).\n- scsi: qla2xxx: Check for firmware dump already collected (bsc#1195823).\n- scsi: qla2xxx: Fix T10 PI tag escape and IP guard options for 28XX adapters (bsc#1195823).\n- scsi: qla2xxx: Fix device reconnect in loop topology (bsc#1195823).\n- scsi: qla2xxx: Fix premature hw access after PCI error (bsc#1195823).\n- scsi: qla2xxx: Fix scheduling while atomic (bsc#1195823).\n- scsi: qla2xxx: Fix stuck session in gpdb (bsc#1195823).\n- scsi: qla2xxx: Fix unmap of already freed sgl (bsc#1195823).\n- scsi: qla2xxx: Fix warning for missing error code (bsc#1195823).\n- scsi: qla2xxx: Fix warning message due to adisc being flushed (bsc#1195823).\n- scsi: qla2xxx: Fix wrong FDMI data for 64G adapter (bsc#1195823).\n- scsi: qla2xxx: Implement ref count for SRB (bsc#1195823).\n- scsi: qla2xxx: Refactor asynchronous command initialization (bsc#1195823).\n- scsi: qla2xxx: Remove a declaration (bsc#1195823).\n- scsi: qla2xxx: Remove unused qla_sess_op_cmd_list from scsi_qla_host_t (bsc#1195823).\n- scsi: qla2xxx: Return -ENOMEM if kzalloc() fails (bsc#1195823).\n- scsi: qla2xxx: Suppress a kernel complaint in qla_create_qpair() (bsc#1195823).\n- scsi: qla2xxx: Update version to 10.02.07.200-k (bsc#1195823).\n- scsi: qla2xxx: Update version to 10.02.07.300-k (bsc#1195823).\n- scsi: qla2xxx: edif: Fix clang warning (bsc#1195823).\n- scsi: qla2xxx: edif: Fix inconsistent check of db_flags (bsc#1195823).\n- scsi: qla2xxx: edif: Reduce connection thrash (bsc#1195823).\n- scsi: qla2xxx: edif: Replace list_for_each_safe with list_for_each_entry_safe (bsc#1195823).\n- scsi: qla2xxx: edif: Tweak trace message (bsc#1195823).\n- scsi: scsi_transport_fc: Add a new rport state FC_PORTSTATE_MARGINAL (bsc#1195506).\n- scsi: scsi_transport_fc: Add store capability to rport port_state in sysfs (bsc#1195506).\n- scsi: target: iscsi: Fix cmd abort fabric stop race (bsc#1195286).\n- scsi: zfcp: Fix failed recovery on gone remote port with non-NPIV FCP devices (bsc#1195378 LTC#196244).\n- scsi_transport_fc: kabi fix blank out FC_PORTSTATE_MARGINAL (bsc#1195506).\n- spi: bcm-qspi: check for valid cs before applying chip select (git-fixes).\n- spi: mediatek: Avoid NULL pointer crash in interrupt (git-fixes).\n- spi: meson-spicc: add IRQ check in meson_spicc_probe (git-fixes).\n- staging/fbtft: Fix backlight (git-fixes).\n- staging: fbtft: Fix error path in fbtft_driver_module_init() (git-fixes).\n- tracing: Do not inc err_log entry count if entry allocation fails (git-fixes).\n- tracing: Dump stacktrace trigger to the corresponding instance (git-fixes).\n- tracing: Fix smatch warning for null glob in event_hist_trigger_parse() (git-fixes).\n- tracing: Have traceon and traceoff trigger honor the instance (git-fixes).\n- tracing: Propagate is_signed to expression (git-fixes).\n- tty: Add support for Brainboxes UC cards (git-fixes).\n- udf: Fix NULL ptr deref when converting from inline format (bsc#1195476).\n- udf: Restore i_lenAlloc when inode expansion fails (bsc#1195477).\n- usb-storage: Add unusual-devs entry for VL817 USB-SATA bridge (git-fixes).\n- usb: dwc2: Fix NULL qh in dwc2_queue_transaction (git-fixes).\n- usb: dwc2: gadget: do not try to disable ep0 in dwc2_hsotg_suspend (git-fixes).\n- usb: dwc3: do not set gadget-\u003eis_otg flag (git-fixes).\n- usb: dwc3: gadget: Prevent core from processing stale TRBs (git-fixes).\n- usb: f_fs: Fix use-after-free for epfile (git-fixes).\n- usb: gadget: f_uac2: Define specific wTerminalType (git-fixes).\n- usb: gadget: rndis: check size of RNDIS_MSG_SET command (git-fixes).\n- usb: gadget: s3c: remove unused \u0027udc\u0027 variable (git-fixes).\n- usb: gadget: udc: renesas_usb3: Fix host to USB_ROLE_NONE transition (git-fixes).\n- usb: host: ehci-tegra: Fix error handling in tegra_ehci_probe() (git-fixes).\n- usb: ulpi: Call of_node_put correctly (git-fixes).\n- usb: ulpi: Move of_node_put to ulpi_dev_release (git-fixes).\n- xhci-pci: Allow host runtime PM as default for Intel Alpine Ridge LP (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-755,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-755", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0755-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:0755-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220755-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:0755-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010393.html" }, { "category": "self", "summary": "SUSE Bug 1089644", "url": "https://bugzilla.suse.com/1089644" }, { "category": "self", "summary": "SUSE Bug 1154353", "url": "https://bugzilla.suse.com/1154353" }, { "category": "self", "summary": "SUSE Bug 1156395", "url": "https://bugzilla.suse.com/1156395" }, { "category": "self", "summary": "SUSE Bug 1157038", "url": "https://bugzilla.suse.com/1157038" }, { "category": "self", "summary": "SUSE Bug 1157923", "url": "https://bugzilla.suse.com/1157923" }, { "category": "self", "summary": "SUSE Bug 1176447", "url": "https://bugzilla.suse.com/1176447" }, { "category": "self", "summary": "SUSE Bug 1176940", "url": "https://bugzilla.suse.com/1176940" }, { "category": "self", "summary": "SUSE Bug 1178134", "url": "https://bugzilla.suse.com/1178134" }, { "category": "self", "summary": "SUSE Bug 1181147", "url": "https://bugzilla.suse.com/1181147" }, { "category": "self", "summary": "SUSE Bug 1181588", "url": "https://bugzilla.suse.com/1181588" }, { "category": "self", "summary": "SUSE Bug 1183872", "url": "https://bugzilla.suse.com/1183872" }, { "category": "self", "summary": "SUSE Bug 1187716", "url": "https://bugzilla.suse.com/1187716" }, { "category": "self", "summary": "SUSE Bug 1188404", "url": "https://bugzilla.suse.com/1188404" }, { "category": "self", "summary": "SUSE Bug 1189126", "url": "https://bugzilla.suse.com/1189126" }, { "category": "self", "summary": "SUSE Bug 1190812", "url": "https://bugzilla.suse.com/1190812" }, { "category": "self", "summary": "SUSE Bug 1190972", "url": "https://bugzilla.suse.com/1190972" }, { "category": "self", "summary": "SUSE Bug 1191580", "url": "https://bugzilla.suse.com/1191580" }, { "category": "self", "summary": "SUSE Bug 1191655", "url": "https://bugzilla.suse.com/1191655" }, { "category": "self", "summary": "SUSE Bug 1191741", "url": "https://bugzilla.suse.com/1191741" }, { "category": "self", "summary": "SUSE Bug 1192210", "url": "https://bugzilla.suse.com/1192210" }, { "category": "self", "summary": "SUSE Bug 1192483", "url": "https://bugzilla.suse.com/1192483" }, { "category": "self", "summary": "SUSE Bug 1193096", "url": "https://bugzilla.suse.com/1193096" }, { "category": "self", "summary": "SUSE Bug 1193233", "url": "https://bugzilla.suse.com/1193233" }, { "category": "self", "summary": "SUSE Bug 1193243", "url": "https://bugzilla.suse.com/1193243" }, { "category": "self", "summary": "SUSE Bug 1193787", "url": "https://bugzilla.suse.com/1193787" }, { "category": "self", "summary": "SUSE Bug 1194163", "url": "https://bugzilla.suse.com/1194163" }, { "category": "self", "summary": "SUSE Bug 1194967", "url": "https://bugzilla.suse.com/1194967" }, { "category": "self", "summary": "SUSE Bug 1195012", "url": "https://bugzilla.suse.com/1195012" }, { "category": "self", "summary": "SUSE Bug 1195081", "url": "https://bugzilla.suse.com/1195081" }, { "category": "self", "summary": "SUSE Bug 1195142", "url": "https://bugzilla.suse.com/1195142" }, { "category": "self", "summary": "SUSE Bug 1195352", "url": "https://bugzilla.suse.com/1195352" }, { "category": "self", "summary": "SUSE Bug 1195378", "url": "https://bugzilla.suse.com/1195378" }, { "category": "self", "summary": "SUSE Bug 1195476", "url": "https://bugzilla.suse.com/1195476" }, { "category": "self", "summary": "SUSE Bug 1195477", "url": "https://bugzilla.suse.com/1195477" }, { "category": "self", "summary": "SUSE Bug 1195478", "url": "https://bugzilla.suse.com/1195478" }, { "category": "self", "summary": "SUSE Bug 1195479", "url": "https://bugzilla.suse.com/1195479" }, { "category": "self", "summary": "SUSE Bug 1195480", "url": "https://bugzilla.suse.com/1195480" }, { "category": "self", "summary": "SUSE Bug 1195481", "url": "https://bugzilla.suse.com/1195481" }, { "category": "self", "summary": "SUSE Bug 1195482", "url": "https://bugzilla.suse.com/1195482" }, { "category": "self", "summary": "SUSE Bug 1195506", "url": "https://bugzilla.suse.com/1195506" }, { "category": "self", "summary": "SUSE Bug 1195516", "url": "https://bugzilla.suse.com/1195516" }, { "category": "self", "summary": "SUSE Bug 1195543", "url": "https://bugzilla.suse.com/1195543" }, { "category": "self", "summary": "SUSE Bug 1195668", "url": "https://bugzilla.suse.com/1195668" }, { "category": "self", "summary": "SUSE Bug 1195701", "url": "https://bugzilla.suse.com/1195701" }, { "category": "self", "summary": "SUSE Bug 1195798", "url": "https://bugzilla.suse.com/1195798" }, { "category": "self", "summary": "SUSE Bug 1195799", "url": "https://bugzilla.suse.com/1195799" }, { "category": "self", "summary": "SUSE Bug 1195823", "url": "https://bugzilla.suse.com/1195823" }, { "category": "self", "summary": "SUSE Bug 1195908", "url": "https://bugzilla.suse.com/1195908" }, { "category": "self", "summary": "SUSE Bug 1195928", "url": "https://bugzilla.suse.com/1195928" }, { "category": "self", "summary": "SUSE Bug 1195947", "url": "https://bugzilla.suse.com/1195947" }, { "category": "self", "summary": "SUSE Bug 1195957", "url": "https://bugzilla.suse.com/1195957" }, { "category": "self", "summary": "SUSE Bug 1195995", "url": "https://bugzilla.suse.com/1195995" }, { "category": "self", "summary": "SUSE Bug 1196195", "url": "https://bugzilla.suse.com/1196195" }, { "category": "self", "summary": "SUSE Bug 1196235", "url": "https://bugzilla.suse.com/1196235" }, { "category": "self", "summary": "SUSE Bug 1196339", "url": "https://bugzilla.suse.com/1196339" }, { "category": "self", "summary": "SUSE Bug 1196400", "url": "https://bugzilla.suse.com/1196400" }, { "category": "self", "summary": "SUSE Bug 1196403", "url": "https://bugzilla.suse.com/1196403" }, { "category": "self", "summary": "SUSE Bug 1196516", "url": "https://bugzilla.suse.com/1196516" }, { "category": "self", "summary": "SUSE Bug 1196584", "url": "https://bugzilla.suse.com/1196584" }, { "category": "self", "summary": "SUSE Bug 1196601", "url": "https://bugzilla.suse.com/1196601" }, { "category": "self", "summary": "SUSE Bug 1196612", "url": "https://bugzilla.suse.com/1196612" }, { "category": "self", "summary": "SUSE Bug 1196776", "url": "https://bugzilla.suse.com/1196776" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0001 page", "url": "https://www.suse.com/security/cve/CVE-2022-0001/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0002 page", "url": "https://www.suse.com/security/cve/CVE-2022-0002/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0492 page", "url": "https://www.suse.com/security/cve/CVE-2022-0492/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0516 page", "url": "https://www.suse.com/security/cve/CVE-2022-0516/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0847 page", "url": "https://www.suse.com/security/cve/CVE-2022-0847/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-25375 page", "url": "https://www.suse.com/security/cve/CVE-2022-25375/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2022-03-08T18:02:40Z", "generator": { "date": "2022-03-08T18:02:40Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:0755-1", "initial_release_date": "2022-03-08T18:02:40Z", "revision_history": [ { "date": "2022-03-08T18:02:40Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-azure-5.3.18-150300.38.47.1.noarch", "product": { "name": "kernel-devel-azure-5.3.18-150300.38.47.1.noarch", "product_id": "kernel-devel-azure-5.3.18-150300.38.47.1.noarch" } }, { "category": "product_version", "name": "kernel-source-azure-5.3.18-150300.38.47.1.noarch", "product": { "name": "kernel-source-azure-5.3.18-150300.38.47.1.noarch", "product_id": "kernel-source-azure-5.3.18-150300.38.47.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-azure-5.3.18-150300.38.47.1.x86_64", "product": { "name": "cluster-md-kmp-azure-5.3.18-150300.38.47.1.x86_64", "product_id": "cluster-md-kmp-azure-5.3.18-150300.38.47.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-azure-5.3.18-150300.38.47.1.x86_64", "product": { "name": "dlm-kmp-azure-5.3.18-150300.38.47.1.x86_64", "product_id": "dlm-kmp-azure-5.3.18-150300.38.47.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-azure-5.3.18-150300.38.47.1.x86_64", "product": { "name": "gfs2-kmp-azure-5.3.18-150300.38.47.1.x86_64", "product_id": "gfs2-kmp-azure-5.3.18-150300.38.47.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-5.3.18-150300.38.47.1.x86_64", "product": { "name": "kernel-azure-5.3.18-150300.38.47.1.x86_64", "product_id": "kernel-azure-5.3.18-150300.38.47.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-devel-5.3.18-150300.38.47.1.x86_64", "product": { "name": "kernel-azure-devel-5.3.18-150300.38.47.1.x86_64", "product_id": "kernel-azure-devel-5.3.18-150300.38.47.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-extra-5.3.18-150300.38.47.1.x86_64", "product": { "name": "kernel-azure-extra-5.3.18-150300.38.47.1.x86_64", "product_id": "kernel-azure-extra-5.3.18-150300.38.47.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-livepatch-devel-5.3.18-150300.38.47.1.x86_64", "product": { "name": "kernel-azure-livepatch-devel-5.3.18-150300.38.47.1.x86_64", "product_id": "kernel-azure-livepatch-devel-5.3.18-150300.38.47.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-optional-5.3.18-150300.38.47.1.x86_64", "product": { "name": "kernel-azure-optional-5.3.18-150300.38.47.1.x86_64", "product_id": "kernel-azure-optional-5.3.18-150300.38.47.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-azure-5.3.18-150300.38.47.1.x86_64", "product": { "name": "kernel-syms-azure-5.3.18-150300.38.47.1.x86_64", "product_id": "kernel-syms-azure-5.3.18-150300.38.47.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-azure-5.3.18-150300.38.47.1.x86_64", "product": { "name": "kselftests-kmp-azure-5.3.18-150300.38.47.1.x86_64", "product_id": "kselftests-kmp-azure-5.3.18-150300.38.47.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-azure-5.3.18-150300.38.47.1.x86_64", "product": { "name": "ocfs2-kmp-azure-5.3.18-150300.38.47.1.x86_64", "product_id": "ocfs2-kmp-azure-5.3.18-150300.38.47.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-azure-5.3.18-150300.38.47.1.x86_64", "product": { "name": "reiserfs-kmp-azure-5.3.18-150300.38.47.1.x86_64", "product_id": "reiserfs-kmp-azure-5.3.18-150300.38.47.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 15 SP3", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 15 SP3", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-5.3.18-150300.38.47.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.47.1.x86_64" }, "product_reference": "kernel-azure-5.3.18-150300.38.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-5.3.18-150300.38.47.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.47.1.x86_64" }, "product_reference": "kernel-azure-devel-5.3.18-150300.38.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-5.3.18-150300.38.47.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.47.1.noarch" }, "product_reference": "kernel-devel-azure-5.3.18-150300.38.47.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-5.3.18-150300.38.47.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.47.1.noarch" }, "product_reference": "kernel-source-azure-5.3.18-150300.38.47.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-5.3.18-150300.38.47.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.47.1.x86_64" }, "product_reference": "kernel-syms-azure-5.3.18-150300.38.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-0001", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0001" } ], "notes": [ { "category": "general", "text": "Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.47.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0001", "url": "https://www.suse.com/security/cve/CVE-2022-0001" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2022-0001", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2022-0001", "url": "https://bugzilla.suse.com/1196901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.47.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.47.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:02:40Z", "details": "moderate" } ], "title": "CVE-2022-0001" }, { "cve": "CVE-2022-0002", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0002" } ], "notes": [ { "category": "general", "text": "Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.47.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0002", "url": "https://www.suse.com/security/cve/CVE-2022-0002" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2022-0002", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2022-0002", "url": "https://bugzilla.suse.com/1196901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.47.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.47.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:02:40Z", "details": "moderate" } ], "title": "CVE-2022-0002" }, { "cve": "CVE-2022-0492", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0492" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in the Linux kernel\u0027s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.47.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0492", "url": "https://www.suse.com/security/cve/CVE-2022-0492" }, { "category": "external", "summary": "SUSE Bug 1195543 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1195543" }, { "category": "external", "summary": "SUSE Bug 1195908 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1195908" }, { "category": "external", "summary": "SUSE Bug 1196612 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1196612" }, { "category": "external", "summary": "SUSE Bug 1196776 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1196776" }, { "category": "external", "summary": "SUSE Bug 1198615 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1198615" }, { "category": "external", "summary": "SUSE Bug 1199255 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1199255" }, { "category": "external", "summary": "SUSE Bug 1199615 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1199615" }, { "category": "external", "summary": "SUSE Bug 1200084 for CVE-2022-0492", "url": "https://bugzilla.suse.com/1200084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.47.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.47.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:02:40Z", "details": "moderate" } ], "title": "CVE-2022-0492" }, { "cve": "CVE-2022-0516", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0516" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in kvm_s390_guest_sida_op in the arch/s390/kvm/kvm-s390.c function in KVM for s390 in the Linux kernel. This flaw allows a local attacker with a normal user privilege to obtain unauthorized memory write access. This flaw affects Linux kernel versions prior to 5.17-rc4.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.47.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0516", "url": "https://www.suse.com/security/cve/CVE-2022-0516" }, { "category": "external", "summary": "SUSE Bug 1195516 for CVE-2022-0516", "url": "https://bugzilla.suse.com/1195516" }, { "category": "external", "summary": "SUSE Bug 1195947 for CVE-2022-0516", "url": "https://bugzilla.suse.com/1195947" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.47.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.47.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:02:40Z", "details": "important" } ], "title": "CVE-2022-0516" }, { "cve": "CVE-2022-0847", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0847" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way the \"flags\" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.47.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0847", "url": "https://www.suse.com/security/cve/CVE-2022-0847" }, { "category": "external", "summary": "SUSE Bug 1196584 for CVE-2022-0847", "url": "https://bugzilla.suse.com/1196584" }, { "category": "external", "summary": "SUSE Bug 1196601 for CVE-2022-0847", "url": "https://bugzilla.suse.com/1196601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.47.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.47.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:02:40Z", "details": "important" } ], "title": "CVE-2022-0847" }, { "cve": "CVE-2022-25375", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-25375" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/usb/gadget/function/rndis.c in the Linux kernel before 5.16.10. The RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command. Attackers can obtain sensitive information from kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.47.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-25375", "url": "https://www.suse.com/security/cve/CVE-2022-25375" }, { "category": "external", "summary": "SUSE Bug 1196235 for CVE-2022-25375", "url": "https://bugzilla.suse.com/1196235" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.47.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.47.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.47.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.47.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-08T18:02:40Z", "details": "moderate" } ], "title": "CVE-2022-25375" } ] }
suse-su-2022:1285-1
Vulnerability from csaf_suse
Published
2022-04-20 13:56
Modified
2022-04-20 13:56
Summary
Security update for xen
Notes
Title of the patch
Security update for xen
Description of the patch
This update for xen fixes the following issues:
- CVE-2022-26356: Fixed potential race conditions in dirty memory tracking that
could cause a denial of service in the host (bsc#1197423).
- CVE-2022-26357: Fixed a potential race condition in memory cleanup for hosts
using VT-d IOMMU hardware, which could lead to a denial of service in the host
(bsc#1197425).
- CVE-2022-26358,CVE-2022-26359,CVE-2022-26360,CVE-2022-26361: Fixed various memory
corruption issues for hosts using VT-d or AMD-Vi IOMMU hardware. These could be
leveraged by an attacker to cause a denial of service in the host (bsc#1197426).
- CVE-2022-0001, CVE-2022-0002, CVE-2021-26401: Added BHB speculation issue
mitigations (bsc#1196915).
Patchnames
SUSE-2022-1285,SUSE-OpenStack-Cloud-9-2022-1285,SUSE-OpenStack-Cloud-Crowbar-9-2022-1285,SUSE-SLE-SAP-12-SP4-2022-1285,SUSE-SLE-SERVER-12-SP4-LTSS-2022-1285
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "This update for xen fixes the following issues:\n\n- CVE-2022-26356: Fixed potential race conditions in dirty memory tracking that\n could cause a denial of service in the host (bsc#1197423).\n- CVE-2022-26357: Fixed a potential race condition in memory cleanup for hosts\n using VT-d IOMMU hardware, which could lead to a denial of service in the host\n (bsc#1197425).\n- CVE-2022-26358,CVE-2022-26359,CVE-2022-26360,CVE-2022-26361: Fixed various memory\n corruption issues for hosts using VT-d or AMD-Vi IOMMU hardware. These could be\n leveraged by an attacker to cause a denial of service in the host (bsc#1197426).\n- CVE-2022-0001, CVE-2022-0002, CVE-2021-26401: Added BHB speculation issue\n mitigations (bsc#1196915).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-1285,SUSE-OpenStack-Cloud-9-2022-1285,SUSE-OpenStack-Cloud-Crowbar-9-2022-1285,SUSE-SLE-SAP-12-SP4-2022-1285,SUSE-SLE-SERVER-12-SP4-LTSS-2022-1285", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_1285-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:1285-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20221285-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:1285-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-April/010779.html" }, { "category": "self", "summary": "SUSE Bug 1196915", "url": "https://bugzilla.suse.com/1196915" }, { "category": "self", "summary": "SUSE Bug 1197423", "url": "https://bugzilla.suse.com/1197423" }, { "category": "self", "summary": "SUSE Bug 1197425", "url": "https://bugzilla.suse.com/1197425" }, { "category": "self", "summary": "SUSE Bug 1197426", "url": "https://bugzilla.suse.com/1197426" }, { "category": "self", "summary": "SUSE CVE CVE-2021-26401 page", "url": "https://www.suse.com/security/cve/CVE-2021-26401/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0001 page", "url": "https://www.suse.com/security/cve/CVE-2022-0001/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0002 page", "url": "https://www.suse.com/security/cve/CVE-2022-0002/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-26356 page", "url": "https://www.suse.com/security/cve/CVE-2022-26356/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-26357 page", "url": "https://www.suse.com/security/cve/CVE-2022-26357/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-26358 page", "url": "https://www.suse.com/security/cve/CVE-2022-26358/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-26359 page", "url": "https://www.suse.com/security/cve/CVE-2022-26359/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-26360 page", "url": "https://www.suse.com/security/cve/CVE-2022-26360/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-26361 page", "url": "https://www.suse.com/security/cve/CVE-2022-26361/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2022-04-20T13:56:38Z", "generator": { "date": "2022-04-20T13:56:38Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:1285-1", "initial_release_date": "2022-04-20T13:56:38Z", "revision_history": [ { "date": "2022-04-20T13:56:38Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-4.11.4_28-2.73.1.aarch64", "product": { "name": "xen-4.11.4_28-2.73.1.aarch64", "product_id": "xen-4.11.4_28-2.73.1.aarch64" } }, { "category": "product_version", "name": "xen-devel-4.11.4_28-2.73.1.aarch64", "product": { "name": "xen-devel-4.11.4_28-2.73.1.aarch64", "product_id": "xen-devel-4.11.4_28-2.73.1.aarch64" } }, { "category": "product_version", "name": "xen-doc-html-4.11.4_28-2.73.1.aarch64", "product": { "name": "xen-doc-html-4.11.4_28-2.73.1.aarch64", "product_id": "xen-doc-html-4.11.4_28-2.73.1.aarch64" } }, { "category": "product_version", "name": "xen-libs-4.11.4_28-2.73.1.aarch64", "product": { "name": "xen-libs-4.11.4_28-2.73.1.aarch64", "product_id": "xen-libs-4.11.4_28-2.73.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-4.11.4_28-2.73.1.aarch64", "product": { "name": "xen-tools-4.11.4_28-2.73.1.aarch64", "product_id": "xen-tools-4.11.4_28-2.73.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-domU-4.11.4_28-2.73.1.aarch64", "product": { "name": "xen-tools-domU-4.11.4_28-2.73.1.aarch64", "product_id": "xen-tools-domU-4.11.4_28-2.73.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "xen-libs-64bit-4.11.4_28-2.73.1.aarch64_ilp32", "product": { "name": "xen-libs-64bit-4.11.4_28-2.73.1.aarch64_ilp32", "product_id": "xen-libs-64bit-4.11.4_28-2.73.1.aarch64_ilp32" } } ], "category": "architecture", "name": "aarch64_ilp32" }, { "branches": [ { "category": "product_version", "name": "xen-devel-4.11.4_28-2.73.1.i586", "product": { "name": "xen-devel-4.11.4_28-2.73.1.i586", "product_id": "xen-devel-4.11.4_28-2.73.1.i586" } }, { "category": "product_version", "name": "xen-libs-4.11.4_28-2.73.1.i586", "product": { "name": "xen-libs-4.11.4_28-2.73.1.i586", "product_id": "xen-libs-4.11.4_28-2.73.1.i586" } }, { "category": "product_version", "name": "xen-tools-domU-4.11.4_28-2.73.1.i586", "product": { "name": "xen-tools-domU-4.11.4_28-2.73.1.i586", "product_id": "xen-tools-domU-4.11.4_28-2.73.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "xen-4.11.4_28-2.73.1.x86_64", "product": { "name": "xen-4.11.4_28-2.73.1.x86_64", "product_id": "xen-4.11.4_28-2.73.1.x86_64" } }, { "category": "product_version", "name": "xen-devel-4.11.4_28-2.73.1.x86_64", "product": { "name": "xen-devel-4.11.4_28-2.73.1.x86_64", "product_id": "xen-devel-4.11.4_28-2.73.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.11.4_28-2.73.1.x86_64", "product": { "name": "xen-doc-html-4.11.4_28-2.73.1.x86_64", "product_id": "xen-doc-html-4.11.4_28-2.73.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.11.4_28-2.73.1.x86_64", "product": { "name": "xen-libs-4.11.4_28-2.73.1.x86_64", "product_id": "xen-libs-4.11.4_28-2.73.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "product": { "name": "xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "product_id": "xen-libs-32bit-4.11.4_28-2.73.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.11.4_28-2.73.1.x86_64", "product": { "name": "xen-tools-4.11.4_28-2.73.1.x86_64", "product_id": "xen-tools-4.11.4_28-2.73.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.11.4_28-2.73.1.x86_64", "product": { "name": "xen-tools-domU-4.11.4_28-2.73.1.x86_64", "product_id": "xen-tools-domU-4.11.4_28-2.73.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE OpenStack Cloud 9", "product": { "name": "SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:9" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud Crowbar 9", "product": { "name": "SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:9" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-4.11.4_28-2.73.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:xen-4.11.4_28-2.73.1.x86_64" }, "product_reference": "xen-4.11.4_28-2.73.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.11.4_28-2.73.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:xen-doc-html-4.11.4_28-2.73.1.x86_64" }, "product_reference": "xen-doc-html-4.11.4_28-2.73.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.11.4_28-2.73.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:xen-libs-4.11.4_28-2.73.1.x86_64" }, "product_reference": "xen-libs-4.11.4_28-2.73.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.11.4_28-2.73.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:xen-libs-32bit-4.11.4_28-2.73.1.x86_64" }, "product_reference": "xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.11.4_28-2.73.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:xen-tools-4.11.4_28-2.73.1.x86_64" }, "product_reference": "xen-tools-4.11.4_28-2.73.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.11.4_28-2.73.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:xen-tools-domU-4.11.4_28-2.73.1.x86_64" }, "product_reference": "xen-tools-domU-4.11.4_28-2.73.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.11.4_28-2.73.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:xen-4.11.4_28-2.73.1.x86_64" }, "product_reference": "xen-4.11.4_28-2.73.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.11.4_28-2.73.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:xen-doc-html-4.11.4_28-2.73.1.x86_64" }, "product_reference": "xen-doc-html-4.11.4_28-2.73.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.11.4_28-2.73.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:xen-libs-4.11.4_28-2.73.1.x86_64" }, "product_reference": "xen-libs-4.11.4_28-2.73.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.11.4_28-2.73.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:xen-libs-32bit-4.11.4_28-2.73.1.x86_64" }, "product_reference": "xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.11.4_28-2.73.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:xen-tools-4.11.4_28-2.73.1.x86_64" }, "product_reference": "xen-tools-4.11.4_28-2.73.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.11.4_28-2.73.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:xen-tools-domU-4.11.4_28-2.73.1.x86_64" }, "product_reference": "xen-tools-domU-4.11.4_28-2.73.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.11.4_28-2.73.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-4.11.4_28-2.73.1.x86_64" }, "product_reference": "xen-4.11.4_28-2.73.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.11.4_28-2.73.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-doc-html-4.11.4_28-2.73.1.x86_64" }, "product_reference": "xen-doc-html-4.11.4_28-2.73.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.11.4_28-2.73.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-4.11.4_28-2.73.1.x86_64" }, "product_reference": "xen-libs-4.11.4_28-2.73.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.11.4_28-2.73.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-32bit-4.11.4_28-2.73.1.x86_64" }, "product_reference": "xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.11.4_28-2.73.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-4.11.4_28-2.73.1.x86_64" }, "product_reference": "xen-tools-4.11.4_28-2.73.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.11.4_28-2.73.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-domU-4.11.4_28-2.73.1.x86_64" }, "product_reference": "xen-tools-domU-4.11.4_28-2.73.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.11.4_28-2.73.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-4.11.4_28-2.73.1.x86_64" }, "product_reference": "xen-4.11.4_28-2.73.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.11.4_28-2.73.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-doc-html-4.11.4_28-2.73.1.x86_64" }, "product_reference": "xen-doc-html-4.11.4_28-2.73.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.11.4_28-2.73.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-4.11.4_28-2.73.1.x86_64" }, "product_reference": "xen-libs-4.11.4_28-2.73.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.11.4_28-2.73.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-32bit-4.11.4_28-2.73.1.x86_64" }, "product_reference": "xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.11.4_28-2.73.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-4.11.4_28-2.73.1.x86_64" }, "product_reference": "xen-tools-4.11.4_28-2.73.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.11.4_28-2.73.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-domU-4.11.4_28-2.73.1.x86_64" }, "product_reference": "xen-tools-domU-4.11.4_28-2.73.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-26401", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-26401" } ], "notes": [ { "category": "general", "text": "LFENCE/JMP (mitigation V2-2) may not sufficiently mitigate CVE-2017-5715 on some AMD CPUs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-tools-domU-4.11.4_28-2.73.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-26401", "url": "https://www.suse.com/security/cve/CVE-2021-26401" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2021-26401", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2021-26401", "url": "https://bugzilla.suse.com/1196901" }, { "category": "external", "summary": "SUSE Bug 1209630 for CVE-2021-26401", "url": "https://bugzilla.suse.com/1209630" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-tools-domU-4.11.4_28-2.73.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-tools-domU-4.11.4_28-2.73.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-20T13:56:38Z", "details": "moderate" } ], "title": "CVE-2021-26401" }, { "cve": "CVE-2022-0001", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0001" } ], "notes": [ { "category": "general", "text": "Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-tools-domU-4.11.4_28-2.73.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0001", "url": "https://www.suse.com/security/cve/CVE-2022-0001" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2022-0001", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2022-0001", "url": "https://bugzilla.suse.com/1196901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-tools-domU-4.11.4_28-2.73.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-tools-domU-4.11.4_28-2.73.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-20T13:56:38Z", "details": "moderate" } ], "title": "CVE-2022-0001" }, { "cve": "CVE-2022-0002", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0002" } ], "notes": [ { "category": "general", "text": "Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-tools-domU-4.11.4_28-2.73.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0002", "url": "https://www.suse.com/security/cve/CVE-2022-0002" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2022-0002", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2022-0002", "url": "https://bugzilla.suse.com/1196901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-tools-domU-4.11.4_28-2.73.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-tools-domU-4.11.4_28-2.73.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-20T13:56:38Z", "details": "moderate" } ], "title": "CVE-2022-0002" }, { "cve": "CVE-2022-26356", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-26356" } ], "notes": [ { "category": "general", "text": "Racy interactions between dirty vram tracking and paging log dirty hypercalls Activation of log dirty mode done by XEN_DMOP_track_dirty_vram (was named HVMOP_track_dirty_vram before Xen 4.9) is racy with ongoing log dirty hypercalls. A suitably timed call to XEN_DMOP_track_dirty_vram can enable log dirty while another CPU is still in the process of tearing down the structures related to a previously enabled log dirty mode (XEN_DOMCTL_SHADOW_OP_OFF). This is due to lack of mutually exclusive locking between both operations and can lead to entries being added in already freed slots, resulting in a memory leak.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-tools-domU-4.11.4_28-2.73.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-26356", "url": "https://www.suse.com/security/cve/CVE-2022-26356" }, { "category": "external", "summary": "SUSE Bug 1197423 for CVE-2022-26356", "url": "https://bugzilla.suse.com/1197423" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-tools-domU-4.11.4_28-2.73.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-tools-domU-4.11.4_28-2.73.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-20T13:56:38Z", "details": "moderate" } ], "title": "CVE-2022-26356" }, { "cve": "CVE-2022-26357", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-26357" } ], "notes": [ { "category": "general", "text": "race in VT-d domain ID cleanup Xen domain IDs are up to 15 bits wide. VT-d hardware may allow for only less than 15 bits to hold a domain ID associating a physical device with a particular domain. Therefore internally Xen domain IDs are mapped to the smaller value range. The cleaning up of the housekeeping structures has a race, allowing for VT-d domain IDs to be leaked and flushes to be bypassed.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-tools-domU-4.11.4_28-2.73.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-26357", "url": "https://www.suse.com/security/cve/CVE-2022-26357" }, { "category": "external", "summary": "SUSE Bug 1197425 for CVE-2022-26357", "url": "https://bugzilla.suse.com/1197425" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-tools-domU-4.11.4_28-2.73.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-tools-domU-4.11.4_28-2.73.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-20T13:56:38Z", "details": "moderate" } ], "title": "CVE-2022-26357" }, { "cve": "CVE-2022-26358", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-26358" } ], "notes": [ { "category": "general", "text": "IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Certain PCI devices in a system might be assigned Reserved Memory Regions (specified via Reserved Memory Region Reporting, \"RMRR\") for Intel VT-d or Unity Mapping ranges for AMD-Vi. These are typically used for platform tasks such as legacy USB emulation. Since the precise purpose of these regions is unknown, once a device associated with such a region is active, the mappings of these regions need to remain continuouly accessible by the device. This requirement has been violated. Subsequent DMA or interrupts from the device may have unpredictable behaviour, ranging from IOMMU faults to memory corruption.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-tools-domU-4.11.4_28-2.73.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-26358", "url": "https://www.suse.com/security/cve/CVE-2022-26358" }, { "category": "external", "summary": "SUSE Bug 1197426 for CVE-2022-26358", "url": "https://bugzilla.suse.com/1197426" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-tools-domU-4.11.4_28-2.73.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-tools-domU-4.11.4_28-2.73.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-20T13:56:38Z", "details": "moderate" } ], "title": "CVE-2022-26358" }, { "cve": "CVE-2022-26359", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-26359" } ], "notes": [ { "category": "general", "text": "IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Certain PCI devices in a system might be assigned Reserved Memory Regions (specified via Reserved Memory Region Reporting, \"RMRR\") for Intel VT-d or Unity Mapping ranges for AMD-Vi. These are typically used for platform tasks such as legacy USB emulation. Since the precise purpose of these regions is unknown, once a device associated with such a region is active, the mappings of these regions need to remain continuouly accessible by the device. This requirement has been violated. Subsequent DMA or interrupts from the device may have unpredictable behaviour, ranging from IOMMU faults to memory corruption.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-tools-domU-4.11.4_28-2.73.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-26359", "url": "https://www.suse.com/security/cve/CVE-2022-26359" }, { "category": "external", "summary": "SUSE Bug 1197426 for CVE-2022-26359", "url": "https://bugzilla.suse.com/1197426" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-tools-domU-4.11.4_28-2.73.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-tools-domU-4.11.4_28-2.73.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-20T13:56:38Z", "details": "moderate" } ], "title": "CVE-2022-26359" }, { "cve": "CVE-2022-26360", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-26360" } ], "notes": [ { "category": "general", "text": "IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Certain PCI devices in a system might be assigned Reserved Memory Regions (specified via Reserved Memory Region Reporting, \"RMRR\") for Intel VT-d or Unity Mapping ranges for AMD-Vi. These are typically used for platform tasks such as legacy USB emulation. Since the precise purpose of these regions is unknown, once a device associated with such a region is active, the mappings of these regions need to remain continuouly accessible by the device. This requirement has been violated. Subsequent DMA or interrupts from the device may have unpredictable behaviour, ranging from IOMMU faults to memory corruption.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-tools-domU-4.11.4_28-2.73.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-26360", "url": "https://www.suse.com/security/cve/CVE-2022-26360" }, { "category": "external", "summary": "SUSE Bug 1197426 for CVE-2022-26360", "url": "https://bugzilla.suse.com/1197426" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-tools-domU-4.11.4_28-2.73.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-tools-domU-4.11.4_28-2.73.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-20T13:56:38Z", "details": "moderate" } ], "title": "CVE-2022-26360" }, { "cve": "CVE-2022-26361", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-26361" } ], "notes": [ { "category": "general", "text": "IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Certain PCI devices in a system might be assigned Reserved Memory Regions (specified via Reserved Memory Region Reporting, \"RMRR\") for Intel VT-d or Unity Mapping ranges for AMD-Vi. These are typically used for platform tasks such as legacy USB emulation. Since the precise purpose of these regions is unknown, once a device associated with such a region is active, the mappings of these regions need to remain continuouly accessible by the device. This requirement has been violated. Subsequent DMA or interrupts from the device may have unpredictable behaviour, ranging from IOMMU faults to memory corruption.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-tools-domU-4.11.4_28-2.73.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-26361", "url": "https://www.suse.com/security/cve/CVE-2022-26361" }, { "category": "external", "summary": "SUSE Bug 1197426 for CVE-2022-26361", "url": "https://bugzilla.suse.com/1197426" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-tools-domU-4.11.4_28-2.73.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud 9:xen-tools-domU-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-doc-html-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-libs-32bit-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-libs-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-tools-4.11.4_28-2.73.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:xen-tools-domU-4.11.4_28-2.73.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-04-20T13:56:38Z", "details": "moderate" } ], "title": "CVE-2022-26361" } ] }
suse-su-2022:0768-1
Vulnerability from csaf_suse
Published
2022-03-09 09:10
Modified
2022-03-09 09:10
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes.
Transient execution side-channel attacks attacking the Branch History Buffer (BHB),
named 'Branch Target Injection' and 'Intra-Mode Branch History Injection' are now mitigated.
The following security bugs were fixed:
- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).
- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).
- CVE-2022-0847: Fixed a vulnerability were a local attackers could overwrite data in arbitrary (read-only) files (bsc#1196584).
- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)
- CVE-2022-0644: Fixed a denial of service by a local user. A assertion failure could be triggered in kernel_read_file_from_fd() (bsc#1196155).
- CVE-2021-44879: In gc_data_segment() in fs/f2fs/gc.c, special files were not considered, which lead to a move_data_page NULL pointer dereference (bsc#1195987).
- CVE-2022-24959: Fixed a memory leak in yam_siocdevprivate() in drivers/net/hamradio/yam.c (bsc#1195897).
- CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).
- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
- CVE-2022-24448: Fixed an issue in fs/nfs/dir.c. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).
The following non-security bugs were fixed:
- crypto: af_alg - get_page upon reassignment to TX SGL (bsc#1195840).
- lib/iov_iter: initialize 'flags' in new pipe_buffer (bsc#1196584).
Patchnames
SUSE-2022-768,SUSE-SLE-Module-Live-Patching-15-SP1-2022-768,SUSE-SLE-Product-HA-15-SP1-2022-768,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-768,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-768,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-768,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-768,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-768,SUSE-Storage-6-2022-768
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes.\n\n\nTransient execution side-channel attacks attacking the Branch History Buffer (BHB),\nnamed \u0027Branch Target Injection\u0027 and \u0027Intra-Mode Branch History Injection\u0027 are now mitigated.\n\nThe following security bugs were fixed:\n\n- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).\n- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).\n- CVE-2022-0847: Fixed a vulnerability were a local attackers could overwrite data in arbitrary (read-only) files (bsc#1196584).\n- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)\n- CVE-2022-0644: Fixed a denial of service by a local user. A assertion failure could be triggered in kernel_read_file_from_fd() (bsc#1196155).\n- CVE-2021-44879: In gc_data_segment() in fs/f2fs/gc.c, special files were not considered, which lead to a move_data_page NULL pointer dereference (bsc#1195987).\n- CVE-2022-24959: Fixed a memory leak in yam_siocdevprivate() in drivers/net/hamradio/yam.c (bsc#1195897).\n- CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).\n- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).\n- CVE-2022-24448: Fixed an issue in fs/nfs/dir.c. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).\n\n\nThe following non-security bugs were fixed:\n\n- crypto: af_alg - get_page upon reassignment to TX SGL (bsc#1195840).\n- lib/iov_iter: initialize \u0027flags\u0027 in new pipe_buffer (bsc#1196584).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-768,SUSE-SLE-Module-Live-Patching-15-SP1-2022-768,SUSE-SLE-Product-HA-15-SP1-2022-768,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-768,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-768,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-768,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-768,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-768,SUSE-Storage-6-2022-768", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0768-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:0768-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20220768-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:0768-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010395.html" }, { "category": "self", "summary": "SUSE Bug 1185973", "url": "https://bugzilla.suse.com/1185973" }, { "category": "self", "summary": "SUSE Bug 1191580", "url": "https://bugzilla.suse.com/1191580" }, { "category": "self", "summary": "SUSE Bug 1194516", "url": "https://bugzilla.suse.com/1194516" }, { "category": "self", "summary": "SUSE Bug 1195536", "url": "https://bugzilla.suse.com/1195536" }, { "category": "self", "summary": "SUSE Bug 1195543", "url": "https://bugzilla.suse.com/1195543" }, { "category": "self", "summary": "SUSE Bug 1195612", "url": "https://bugzilla.suse.com/1195612" }, { "category": "self", "summary": "SUSE Bug 1195840", "url": "https://bugzilla.suse.com/1195840" }, { "category": "self", "summary": "SUSE Bug 1195897", "url": "https://bugzilla.suse.com/1195897" }, { "category": "self", "summary": "SUSE Bug 1195908", "url": "https://bugzilla.suse.com/1195908" }, { "category": "self", "summary": "SUSE Bug 1195949", "url": "https://bugzilla.suse.com/1195949" }, { "category": "self", "summary": "SUSE Bug 1195987", "url": "https://bugzilla.suse.com/1195987" }, { "category": "self", "summary": "SUSE Bug 1196079", "url": "https://bugzilla.suse.com/1196079" }, { "category": "self", "summary": "SUSE Bug 1196155", "url": "https://bugzilla.suse.com/1196155" }, { "category": "self", "summary": "SUSE Bug 1196584", "url": "https://bugzilla.suse.com/1196584" }, { "category": "self", "summary": "SUSE Bug 1196612", "url": "https://bugzilla.suse.com/1196612" }, { "category": "self", "summary": "SUSE CVE CVE-2021-44879 page", "url": "https://www.suse.com/security/cve/CVE-2021-44879/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0001 page", "url": "https://www.suse.com/security/cve/CVE-2022-0001/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0002 page", "url": "https://www.suse.com/security/cve/CVE-2022-0002/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0487 page", "url": "https://www.suse.com/security/cve/CVE-2022-0487/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0492 page", "url": "https://www.suse.com/security/cve/CVE-2022-0492/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0617 page", "url": "https://www.suse.com/security/cve/CVE-2022-0617/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0644 page", "url": "https://www.suse.com/security/cve/CVE-2022-0644/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0847 page", "url": "https://www.suse.com/security/cve/CVE-2022-0847/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-24448 page", "url": "https://www.suse.com/security/cve/CVE-2022-24448/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-24959 page", "url": "https://www.suse.com/security/cve/CVE-2022-24959/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2022-03-09T09:10:04Z", "generator": { "date": "2022-03-09T09:10:04Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:0768-1", "initial_release_date": "2022-03-09T09:10:04Z", "revision_history": [ { "date": "2022-03-09T09:10:04Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-197.108.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.12.14-197.108.1.aarch64", "product_id": "cluster-md-kmp-default-4.12.14-197.108.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-197.108.1.aarch64", "product": { "name": "dlm-kmp-default-4.12.14-197.108.1.aarch64", "product_id": "dlm-kmp-default-4.12.14-197.108.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-197.108.1.aarch64", "product": { "name": "gfs2-kmp-default-4.12.14-197.108.1.aarch64", "product_id": "gfs2-kmp-default-4.12.14-197.108.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-197.108.1.aarch64", "product": { "name": "kernel-default-4.12.14-197.108.1.aarch64", "product_id": "kernel-default-4.12.14-197.108.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-197.108.1.aarch64", "product": { "name": "kernel-default-base-4.12.14-197.108.1.aarch64", "product_id": "kernel-default-base-4.12.14-197.108.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-197.108.1.aarch64", "product": { "name": "kernel-default-devel-4.12.14-197.108.1.aarch64", "product_id": "kernel-default-devel-4.12.14-197.108.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-197.108.1.aarch64", "product": { "name": "kernel-default-extra-4.12.14-197.108.1.aarch64", "product_id": "kernel-default-extra-4.12.14-197.108.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-197.108.1.aarch64", "product": { "name": "kernel-default-livepatch-4.12.14-197.108.1.aarch64", "product_id": "kernel-default-livepatch-4.12.14-197.108.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-197.108.1.aarch64", "product": { "name": "kernel-default-livepatch-devel-4.12.14-197.108.1.aarch64", "product_id": "kernel-default-livepatch-devel-4.12.14-197.108.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-197.108.1.aarch64", "product": { "name": "kernel-obs-build-4.12.14-197.108.1.aarch64", "product_id": "kernel-obs-build-4.12.14-197.108.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-197.108.1.aarch64", "product": { "name": "kernel-obs-qa-4.12.14-197.108.1.aarch64", "product_id": "kernel-obs-qa-4.12.14-197.108.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-197.108.1.aarch64", "product": { "name": "kernel-syms-4.12.14-197.108.1.aarch64", "product_id": "kernel-syms-4.12.14-197.108.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-197.108.1.aarch64", "product": { "name": "kernel-vanilla-4.12.14-197.108.1.aarch64", "product_id": "kernel-vanilla-4.12.14-197.108.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-197.108.1.aarch64", "product": { "name": "kernel-vanilla-base-4.12.14-197.108.1.aarch64", "product_id": "kernel-vanilla-base-4.12.14-197.108.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-197.108.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.12.14-197.108.1.aarch64", "product_id": "kernel-vanilla-devel-4.12.14-197.108.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-197.108.1.aarch64", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-197.108.1.aarch64", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.108.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-197.108.1.aarch64", "product": { "name": "kselftests-kmp-default-4.12.14-197.108.1.aarch64", "product_id": "kselftests-kmp-default-4.12.14-197.108.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-197.108.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.12.14-197.108.1.aarch64", "product_id": "ocfs2-kmp-default-4.12.14-197.108.1.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "product": { "name": "reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "product_id": "reiserfs-kmp-default-4.12.14-197.108.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-197.108.1.noarch", "product": { "name": "kernel-devel-4.12.14-197.108.1.noarch", "product_id": "kernel-devel-4.12.14-197.108.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-197.108.1.noarch", "product": { "name": "kernel-docs-4.12.14-197.108.1.noarch", "product_id": "kernel-docs-4.12.14-197.108.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-197.108.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-197.108.1.noarch", "product_id": "kernel-docs-html-4.12.14-197.108.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-197.108.1.noarch", "product": { "name": "kernel-macros-4.12.14-197.108.1.noarch", "product_id": "kernel-macros-4.12.14-197.108.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-197.108.1.noarch", "product": { "name": "kernel-source-4.12.14-197.108.1.noarch", "product_id": "kernel-source-4.12.14-197.108.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-197.108.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-197.108.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-197.108.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-197.108.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.12.14-197.108.1.ppc64le", "product_id": "cluster-md-kmp-default-4.12.14-197.108.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-197.108.1.ppc64le", "product": { "name": "dlm-kmp-default-4.12.14-197.108.1.ppc64le", "product_id": "dlm-kmp-default-4.12.14-197.108.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-197.108.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.12.14-197.108.1.ppc64le", "product_id": "gfs2-kmp-default-4.12.14-197.108.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-197.108.1.ppc64le", "product": { "name": "kernel-debug-4.12.14-197.108.1.ppc64le", "product_id": "kernel-debug-4.12.14-197.108.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-197.108.1.ppc64le", "product": { "name": "kernel-debug-base-4.12.14-197.108.1.ppc64le", "product_id": "kernel-debug-base-4.12.14-197.108.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-197.108.1.ppc64le", "product": { "name": "kernel-debug-devel-4.12.14-197.108.1.ppc64le", "product_id": "kernel-debug-devel-4.12.14-197.108.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-4.12.14-197.108.1.ppc64le", "product": { "name": "kernel-debug-livepatch-devel-4.12.14-197.108.1.ppc64le", "product_id": "kernel-debug-livepatch-devel-4.12.14-197.108.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.12.14-197.108.1.ppc64le", "product": { "name": "kernel-default-4.12.14-197.108.1.ppc64le", "product_id": "kernel-default-4.12.14-197.108.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-197.108.1.ppc64le", "product": { "name": "kernel-default-base-4.12.14-197.108.1.ppc64le", "product_id": "kernel-default-base-4.12.14-197.108.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-197.108.1.ppc64le", "product": { "name": "kernel-default-devel-4.12.14-197.108.1.ppc64le", "product_id": "kernel-default-devel-4.12.14-197.108.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-197.108.1.ppc64le", "product": { "name": "kernel-default-extra-4.12.14-197.108.1.ppc64le", "product_id": "kernel-default-extra-4.12.14-197.108.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-197.108.1.ppc64le", "product": { "name": "kernel-default-livepatch-4.12.14-197.108.1.ppc64le", "product_id": "kernel-default-livepatch-4.12.14-197.108.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-197.108.1.ppc64le", "product": { "name": "kernel-default-livepatch-devel-4.12.14-197.108.1.ppc64le", "product_id": "kernel-default-livepatch-devel-4.12.14-197.108.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_108-default-1-3.3.1.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-197_108-default-1-3.3.1.ppc64le", "product_id": "kernel-livepatch-4_12_14-197_108-default-1-3.3.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-197.108.1.ppc64le", "product": { "name": "kernel-obs-build-4.12.14-197.108.1.ppc64le", "product_id": "kernel-obs-build-4.12.14-197.108.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-197.108.1.ppc64le", "product": { "name": "kernel-obs-qa-4.12.14-197.108.1.ppc64le", "product_id": "kernel-obs-qa-4.12.14-197.108.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-197.108.1.ppc64le", "product": { "name": "kernel-syms-4.12.14-197.108.1.ppc64le", "product_id": "kernel-syms-4.12.14-197.108.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-197.108.1.ppc64le", "product": { "name": "kernel-vanilla-4.12.14-197.108.1.ppc64le", "product_id": "kernel-vanilla-4.12.14-197.108.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-197.108.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.12.14-197.108.1.ppc64le", "product_id": "kernel-vanilla-base-4.12.14-197.108.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-197.108.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.12.14-197.108.1.ppc64le", "product_id": "kernel-vanilla-devel-4.12.14-197.108.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-197.108.1.ppc64le", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-197.108.1.ppc64le", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.108.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-197.108.1.ppc64le", "product": { "name": "kselftests-kmp-default-4.12.14-197.108.1.ppc64le", "product_id": "kselftests-kmp-default-4.12.14-197.108.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-197.108.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.12.14-197.108.1.ppc64le", "product_id": "ocfs2-kmp-default-4.12.14-197.108.1.ppc64le" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "product": { "name": "reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "product_id": "reiserfs-kmp-default-4.12.14-197.108.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-197.108.1.s390x", "product": { "name": "cluster-md-kmp-default-4.12.14-197.108.1.s390x", "product_id": "cluster-md-kmp-default-4.12.14-197.108.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-197.108.1.s390x", "product": { "name": "dlm-kmp-default-4.12.14-197.108.1.s390x", "product_id": "dlm-kmp-default-4.12.14-197.108.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-197.108.1.s390x", "product": { "name": "gfs2-kmp-default-4.12.14-197.108.1.s390x", "product_id": "gfs2-kmp-default-4.12.14-197.108.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.12.14-197.108.1.s390x", "product": { "name": "kernel-default-4.12.14-197.108.1.s390x", "product_id": "kernel-default-4.12.14-197.108.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-197.108.1.s390x", "product": { "name": "kernel-default-base-4.12.14-197.108.1.s390x", "product_id": "kernel-default-base-4.12.14-197.108.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-197.108.1.s390x", "product": { "name": "kernel-default-devel-4.12.14-197.108.1.s390x", "product_id": "kernel-default-devel-4.12.14-197.108.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-197.108.1.s390x", "product": { "name": "kernel-default-extra-4.12.14-197.108.1.s390x", "product_id": "kernel-default-extra-4.12.14-197.108.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-197.108.1.s390x", "product": { "name": "kernel-default-livepatch-4.12.14-197.108.1.s390x", "product_id": "kernel-default-livepatch-4.12.14-197.108.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-197.108.1.s390x", "product": { "name": "kernel-default-livepatch-devel-4.12.14-197.108.1.s390x", "product_id": "kernel-default-livepatch-devel-4.12.14-197.108.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.12.14-197.108.1.s390x", "product": { "name": "kernel-default-man-4.12.14-197.108.1.s390x", "product_id": "kernel-default-man-4.12.14-197.108.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-197.108.1.s390x", "product": { "name": "kernel-obs-build-4.12.14-197.108.1.s390x", "product_id": "kernel-obs-build-4.12.14-197.108.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-197.108.1.s390x", "product": { "name": "kernel-obs-qa-4.12.14-197.108.1.s390x", "product_id": "kernel-obs-qa-4.12.14-197.108.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-197.108.1.s390x", "product": { "name": "kernel-syms-4.12.14-197.108.1.s390x", "product_id": "kernel-syms-4.12.14-197.108.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-197.108.1.s390x", "product": { "name": "kernel-vanilla-4.12.14-197.108.1.s390x", "product_id": "kernel-vanilla-4.12.14-197.108.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-197.108.1.s390x", "product": { "name": "kernel-vanilla-base-4.12.14-197.108.1.s390x", "product_id": "kernel-vanilla-base-4.12.14-197.108.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-197.108.1.s390x", "product": { "name": "kernel-vanilla-devel-4.12.14-197.108.1.s390x", "product_id": "kernel-vanilla-devel-4.12.14-197.108.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-197.108.1.s390x", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-197.108.1.s390x", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.108.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.12.14-197.108.1.s390x", "product": { "name": "kernel-zfcpdump-4.12.14-197.108.1.s390x", "product_id": "kernel-zfcpdump-4.12.14-197.108.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-man-4.12.14-197.108.1.s390x", "product": { "name": "kernel-zfcpdump-man-4.12.14-197.108.1.s390x", "product_id": "kernel-zfcpdump-man-4.12.14-197.108.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-197.108.1.s390x", "product": { "name": "kselftests-kmp-default-4.12.14-197.108.1.s390x", "product_id": "kselftests-kmp-default-4.12.14-197.108.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-197.108.1.s390x", "product": { "name": "ocfs2-kmp-default-4.12.14-197.108.1.s390x", "product_id": "ocfs2-kmp-default-4.12.14-197.108.1.s390x" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-197.108.1.s390x", "product": { "name": "reiserfs-kmp-default-4.12.14-197.108.1.s390x", "product_id": "reiserfs-kmp-default-4.12.14-197.108.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-197.108.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.12.14-197.108.1.x86_64", "product_id": "cluster-md-kmp-default-4.12.14-197.108.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-197.108.1.x86_64", "product": { "name": "dlm-kmp-default-4.12.14-197.108.1.x86_64", "product_id": "dlm-kmp-default-4.12.14-197.108.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-197.108.1.x86_64", "product": { "name": "gfs2-kmp-default-4.12.14-197.108.1.x86_64", "product_id": "gfs2-kmp-default-4.12.14-197.108.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-197.108.1.x86_64", "product": { "name": "kernel-debug-4.12.14-197.108.1.x86_64", "product_id": "kernel-debug-4.12.14-197.108.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-197.108.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-197.108.1.x86_64", "product_id": "kernel-debug-base-4.12.14-197.108.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-197.108.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-197.108.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-197.108.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-4.12.14-197.108.1.x86_64", "product": { "name": "kernel-debug-livepatch-devel-4.12.14-197.108.1.x86_64", "product_id": "kernel-debug-livepatch-devel-4.12.14-197.108.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-197.108.1.x86_64", "product": { "name": "kernel-default-4.12.14-197.108.1.x86_64", "product_id": "kernel-default-4.12.14-197.108.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-197.108.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-197.108.1.x86_64", "product_id": "kernel-default-base-4.12.14-197.108.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-197.108.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-197.108.1.x86_64", "product_id": "kernel-default-devel-4.12.14-197.108.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-197.108.1.x86_64", "product": { "name": "kernel-default-extra-4.12.14-197.108.1.x86_64", "product_id": "kernel-default-extra-4.12.14-197.108.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-197.108.1.x86_64", "product": { "name": "kernel-default-livepatch-4.12.14-197.108.1.x86_64", "product_id": "kernel-default-livepatch-4.12.14-197.108.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-197.108.1.x86_64", "product": { "name": "kernel-default-livepatch-devel-4.12.14-197.108.1.x86_64", "product_id": "kernel-default-livepatch-devel-4.12.14-197.108.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-197.108.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-197.108.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-197.108.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-197.108.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-197.108.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-197.108.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-197.108.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-197.108.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-197.108.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-livepatch-devel-4.12.14-197.108.1.x86_64", "product": { "name": "kernel-kvmsmall-livepatch-devel-4.12.14-197.108.1.x86_64", "product_id": "kernel-kvmsmall-livepatch-devel-4.12.14-197.108.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_108-default-1-3.3.1.x86_64", "product": { "name": "kernel-livepatch-4_12_14-197_108-default-1-3.3.1.x86_64", "product_id": "kernel-livepatch-4_12_14-197_108-default-1-3.3.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-197.108.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-197.108.1.x86_64", "product_id": "kernel-obs-build-4.12.14-197.108.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-197.108.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-197.108.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-197.108.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-197.108.1.x86_64", "product": { "name": "kernel-syms-4.12.14-197.108.1.x86_64", "product_id": "kernel-syms-4.12.14-197.108.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-197.108.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-197.108.1.x86_64", "product_id": "kernel-vanilla-4.12.14-197.108.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-197.108.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-197.108.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-197.108.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-197.108.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-197.108.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-197.108.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-197.108.1.x86_64", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-197.108.1.x86_64", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.108.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-197.108.1.x86_64", "product": { "name": "kselftests-kmp-default-4.12.14-197.108.1.x86_64", "product_id": "kselftests-kmp-default-4.12.14-197.108.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-197.108.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.12.14-197.108.1.x86_64", "product_id": "ocfs2-kmp-default-4.12.14-197.108.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "product": { "name": "reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "product_id": "reiserfs-kmp-default-4.12.14-197.108.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 15 SP1", "product": { "name": "SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP1-BCL", "product": { "name": "SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_bcl:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp1" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 6", "product": { "name": "SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:6" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-4.12.14-197.108.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.ppc64le" }, "product_reference": "kernel-default-livepatch-4.12.14-197.108.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-4.12.14-197.108.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-default-livepatch-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-4.12.14-197.108.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.ppc64le" }, "product_reference": "kernel-default-livepatch-devel-4.12.14-197.108.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-4.12.14-197.108.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-default-livepatch-devel-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_108-default-1-3.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_108-default-1-3.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_108-default-1-3.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_108-default-1-3.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-197.108.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.aarch64" }, "product_reference": "cluster-md-kmp-default-4.12.14-197.108.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-197.108.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.12.14-197.108.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-197.108.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.12.14-197.108.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-197.108.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-197.108.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.aarch64" }, "product_reference": "dlm-kmp-default-4.12.14-197.108.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-197.108.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.12.14-197.108.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-197.108.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.s390x" }, "product_reference": "dlm-kmp-default-4.12.14-197.108.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-197.108.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.x86_64" }, "product_reference": "dlm-kmp-default-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-197.108.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.aarch64" }, "product_reference": "gfs2-kmp-default-4.12.14-197.108.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-197.108.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.12.14-197.108.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-197.108.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.s390x" }, "product_reference": "gfs2-kmp-default-4.12.14-197.108.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-197.108.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-197.108.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.aarch64" }, "product_reference": "ocfs2-kmp-default-4.12.14-197.108.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-197.108.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.12.14-197.108.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-197.108.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.12.14-197.108.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-197.108.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.108.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.aarch64" }, "product_reference": "kernel-default-4.12.14-197.108.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.108.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-default-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.108.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-197.108.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.108.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.108.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-197.108.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.108.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-197.108.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.108.1.noarch" }, "product_reference": "kernel-devel-4.12.14-197.108.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-197.108.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.108.1.noarch" }, "product_reference": "kernel-docs-4.12.14-197.108.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-197.108.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.108.1.noarch" }, "product_reference": "kernel-macros-4.12.14-197.108.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.108.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-197.108.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.108.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-197.108.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.108.1.noarch" }, "product_reference": "kernel-source-4.12.14-197.108.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.108.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-197.108.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.108.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.108.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64" }, "product_reference": "kernel-default-4.12.14-197.108.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.108.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-default-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.108.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-197.108.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.108.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.108.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-197.108.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.108.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-197.108.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch" }, "product_reference": "kernel-devel-4.12.14-197.108.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-197.108.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch" }, "product_reference": "kernel-docs-4.12.14-197.108.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-197.108.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch" }, "product_reference": "kernel-macros-4.12.14-197.108.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.108.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-197.108.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.108.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-197.108.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch" }, "product_reference": "kernel-source-4.12.14-197.108.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.108.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-197.108.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.108.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.108.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-default-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.108.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.108.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-197.108.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.108.1.noarch" }, "product_reference": "kernel-devel-4.12.14-197.108.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-197.108.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.108.1.noarch" }, "product_reference": "kernel-docs-4.12.14-197.108.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-197.108.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.108.1.noarch" }, "product_reference": "kernel-macros-4.12.14-197.108.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.108.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-197.108.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.108.1.noarch" }, "product_reference": "kernel-source-4.12.14-197.108.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.108.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.108.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.108.1.x86_64" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.108.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64" }, "product_reference": "kernel-default-4.12.14-197.108.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.108.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-197.108.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.108.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.s390x" }, "product_reference": "kernel-default-4.12.14-197.108.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.108.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-default-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.108.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-197.108.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.108.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-197.108.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.108.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-197.108.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.108.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.108.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-197.108.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.108.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-197.108.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.108.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-197.108.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.108.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-197.108.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.108.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-197.108.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-197.108.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch" }, "product_reference": "kernel-devel-4.12.14-197.108.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-197.108.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch" }, "product_reference": "kernel-docs-4.12.14-197.108.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-197.108.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch" }, "product_reference": "kernel-macros-4.12.14-197.108.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.108.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-197.108.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.108.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.ppc64le" }, "product_reference": "kernel-obs-build-4.12.14-197.108.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.108.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.s390x" }, "product_reference": "kernel-obs-build-4.12.14-197.108.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.108.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-197.108.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch" }, "product_reference": "kernel-source-4.12.14-197.108.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.108.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-197.108.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.108.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-197.108.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.108.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.s390x" }, "product_reference": "kernel-syms-4.12.14-197.108.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.108.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.108.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.aarch64" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.108.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.108.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.s390x" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.108.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.108.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.x86_64" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.108.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-197.108.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.108.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-default-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.108.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-197.108.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.108.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.108.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-197.108.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.108.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-197.108.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.108.1.noarch" }, "product_reference": "kernel-devel-4.12.14-197.108.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-197.108.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.108.1.noarch" }, "product_reference": "kernel-docs-4.12.14-197.108.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-197.108.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.108.1.noarch" }, "product_reference": "kernel-macros-4.12.14-197.108.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.108.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.ppc64le" }, "product_reference": "kernel-obs-build-4.12.14-197.108.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.108.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-197.108.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.108.1.noarch" }, "product_reference": "kernel-source-4.12.14-197.108.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.108.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-197.108.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.108.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.108.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.108.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.x86_64" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.108.1.aarch64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.aarch64" }, "product_reference": "kernel-default-4.12.14-197.108.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.108.1.x86_64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-default-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.108.1.aarch64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-197.108.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.108.1.x86_64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.108.1.aarch64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-197.108.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.108.1.x86_64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-197.108.1.noarch as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.108.1.noarch" }, "product_reference": "kernel-devel-4.12.14-197.108.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-197.108.1.noarch as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.108.1.noarch" }, "product_reference": "kernel-docs-4.12.14-197.108.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-197.108.1.noarch as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.108.1.noarch" }, "product_reference": "kernel-macros-4.12.14-197.108.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.108.1.aarch64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-197.108.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.108.1.x86_64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-197.108.1.noarch as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.108.1.noarch" }, "product_reference": "kernel-source-4.12.14-197.108.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.108.1.aarch64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-197.108.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.108.1.x86_64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.108.1.aarch64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.aarch64" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.108.1.x86_64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.x86_64" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 6" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-44879", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-44879" } ], "notes": [ { "category": "general", "text": "In gc_data_segment in fs/f2fs/gc.c in the Linux kernel before 5.16.3, special files are not considered, leading to a move_data_page NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-44879", "url": "https://www.suse.com/security/cve/CVE-2021-44879" }, { "category": "external", "summary": "SUSE Bug 1195987 for CVE-2021-44879", "url": "https://bugzilla.suse.com/1195987" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T09:10:04Z", "details": "moderate" } ], "title": "CVE-2021-44879" }, { "cve": "CVE-2022-0001", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0001" } ], "notes": [ { "category": "general", "text": "Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0001", "url": "https://www.suse.com/security/cve/CVE-2022-0001" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2022-0001", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2022-0001", "url": "https://bugzilla.suse.com/1196901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_108-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.108.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-03-09T09:10:04Z", "details": "moderate" } ], "title": "CVE-2022-0001" }, { "cve": "CVE-2022-0002", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0002" } ], "notes": [ { "category": "general", "text": "Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.108.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.108.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.108.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.108.1.aarch64", "SUSE L